T
OUT
A HACKERS
GUIDE TO
COMPUTER
SECURITY
MICROSOFT.
BY “THE CRACKER”
BILL LANDRETH
with Howard Rheingold
PUBLISHED BY
Microsoft Press
A Division of Microsoft Corporation
10700 Norlhup Way, Box 97200, Bellevue, Washington 98009
Copyright © 1985 by Bill Land ret h
All rights reserved. No part of the contents of this book may be
reproduced or transmitted in any form or by any means without
the written permission of the publisher.
Library of Congress Cataloging in Publication Data
Landrcth, Bill, 1964-
Gut of the inner circle.
Includes index.
L Electronic data processing departments - Security measures. I. Title.
HF554S.37,L36 1984 658,478 84-25402
ISBN 0-914845-36-5 (paper)
ISBN 0-914845-45-4 (cloth)
Printed and bound in the United States of America,
123456789 FGFG 89098765
Distributed to the book trade in the United States and Canada
by Simon & Schuster, Inc.
Simon & Schuster Order No. 0-671-30942-0 (paper)
0-671-30949-8 (cloth)
Distributed to the book trade outside the United Slates and Canada
by Penguin Books Ltd.
Penguin Books Ltd,, Harmondsworth, Middlesex, England
Penguin Books Australia Ltd., Ringwood, Victoria, Australia
Penguin Books N.Z, Ltd., 182-190 Wairau Road, Auckland 10, New Zealand
Penguin ISBN 0-14-G87-139-X (paper)
British Cataloging in Publication Data available
Apple 0 * is a registered trademark of Apple Computer, Incorporated, UNIX™ is a trademark of Bell
Laboratories, Commodore™ is a trademark ol Commodore Electronics Limited. CompuServe 0 * is a
registered trademark of CompuServe Information Service, Cray™ is a trademarks! Cray Research
Incorporated. Nova" 1 ' is a registered trademark of Data General Corporation. DIALOG* is a
registered service mark of DIALOG Information Services, Incorporated. DEC* and VAX* are
registered trademarks, and DECnet 1 ' 1 and VMS™ are trademarks of Digital Equipment Corporation,
Dow Jones News/Retrieval** is a registered trademark of Dow Jones & Company, Incorporated. HP""
is a registered trademark of Hewlett-Packard. IBM* and IBM XT'* are registered trademarks, and
IBM AT 1 ' 1 is a trademark of International Business Machines Corporation* Microsoft* is a registered
trademark, and MS-DOS™ is a trademark of Microsoft Corporation. Prime "'and Frimos^ are
registered trademarks of Prime Computer, Incorporated TRS-80* is a registered trademark of
Radio Shack, a division of Tandy Corporation. THE SOURCE™ is a service mark of Source
Telecomputing Corporation.
Disclaimer* Microsoft Press has not undertaken a comprehensive investigation of the fact and
representations of the author with regard to particular computer systems, operating systems or
other products. Consequently, although it has no knowledge of any inaccuracies in the author’s
treatment of particular products, Microsoft Press makes no warranties or representations
regarding their accuracy and disclaims ail liability therefor.
Contents
CHAPTER ONE
CHAPTER TWO
CHAPTER THREE
CHAPTER FOUR
CHAPTER FIVE
CHAPTER SIX
CHAPTER SEVEN
CHAPTER EIGHT
CHAPTER NINE
CHAPTER TEN
CHAPTER ELEVEN
Foreword vii
Prologue 1
Inside the Inner Circle 9
A Look at the Past 25
A Look at Computers 37
Who Hacks and Why 57
How a Hacker Hacks 73
How Much to Worry About Security 103
Make the Most of What You’ve Got 123
External Security Devices 143
Microcomputers and Security 161
Telltale Signs 185
What to Do with the Hacker
You’ve Caught 195
Epilogue 207
Appendix 215
Index 227
Foreword
This book tells you about many of the experiences and stories
that were part of my life as a sixteen-year-old hacker. I’ve tried where
possible to make references general, rather than specific, to avoid giv¬
ing you the impression that a particular hacking approach or technique
always works on a single type or class of computer system. Hackers
try all kinds of things - they have nothing to lose and everything (in
their eyes) to gain.
This book gives my view of the hacking experiences I describe.
If, in writing, I have misrepresented or misunderstood any event, I
have done so unknowingly. As I state many times: Computer security
is ultimately the responsibility of the people who use computers, not
of the machines and programs themselves.
While a book reflects the feelings and opinions of the person
who writes it, there are many other people who commit their time and
their abilities to making the book as good as it can be. For their help
and encouragement, I would like to thank the people at Microsoft
Press - in particular, Karen Meredith, publicist; Barry Preppernau,
senior technical reviewer; Salley Oberlin, editorial director; Joyce Cox,
managing editor; and JoAnne Woodcock, senior editor. Special thanks
also go to William Gladstone, my literary agent.
To the many other people who have contributed to this book: my
appreciation for your efforts in making this an experience to be re¬
membered. Thank you.
Bill Landreth
Pozvay, California
January 1985
Prologue
I
JLt seems that the Age of Electronics has jumped out and caught a
great many people more or less unprepared. Computer technology has
evolved rapidly and in many directions in the past few years, and one
of the offshoots of this development has been the rise of a new form of
trespass: microcomputer hacking.
If you are a computer user, but not a computer professional, you
may be wondering what goes on during those m ldd le - of -1 he - nig h t
hackers’ incursions that have been reported so often lately in the local
and national press. If so, the following story may help give you a better
feel for computers, hacking, and the interactions between hackers and
computer professionals. The story is based on a real computer and a
real corporation. Obviously, since I wasn't in the computer room, the
dialogue is not real in the sense that I am quoting anyone. It is real,
however, in the sense that it is based on many conversations 1 have had
with dozens of people who are very much like the characters you will
read about here.
I
OUT Of 7 H f INNER CIRCLE
BLINDMAN’S the scene: The control room in the computer center of one of the
BUFF, HACKER largest corporations in the world-an automobile manufacturer we’ll
STYLE call MegaCar International, the time: 12:30 a.m. — the beginning of
the graveyard shift.
Al, a system operator, has just arrived for work. He signs in with
the armed guard at the security consoie located between the main en¬
trance to the building and the hallway that leads to the computer cen¬
ter. Halfway down the hall, he shows his ID badge to another guard,
then passes in front of twin television cameras at the entrance to the
computer center. Before entering the control room, he goes through
another, identical, set of security procedures.
There are good reasons for the tight security that surrounds Al’s
workstation: He controls access to the computers that hold informa¬
tion worth billions of dollars to MegaCar International - and to Mega-
Car’s competitors. Every night, the mainframes, minicomputers, and
workstations of MegaCar’s worldwide computer network process
scores of secret details on next year’s automobile designs, along with
dozens of high-level, strategic electronic memos and thousands of
scraps of financial and technical information.
This control center is the “brain” of the worldwide network,
where everything comes together. It is also where the most intense
action takes place when things go wrong. Common problems are han¬
dled by specialized troubleshooting computers, or by system opera¬
tors at local and regional computer' centers around the world. But if
the troubleshooting computers break down, or the local system opera¬
tors can’t pinpoint the problem, or the network itself runs into trouble,
then Al and his colleagues must figure out what to do to keep the num¬
bers crunching and the data flowing.
Despite his title, Al is no typical “system operator.” His actual
duties would probably suggest the title of security officer or on-call
handyman. In addition to keeping the printers full of paper, keeping
track of the reels of magnetic tape, and helping users out with minor
problems (as all system operators must do), Al is one of several highly
trained support people who are on call twenty-four hours a day to
resolve any potential hangups or security breaches in and among the
many “nodes” of MegaCar’s electronic “filing cabinets.”
2
P R 0 1 0 G U E
But whether or not your job includes watching for intruders, be¬
ing a system operator on the graveyard shift means going through long
periods of inactivity punctuated by brief periods of frenzied work. A1
isn’t anticipating anything different tonight. Seated in front of a bank
of computer terminals, a cup of coffee in one hand and a printout of
the evening’s computer activities in the other, he prepares for another
uneventful round of crossword puzzles and solitaire, with perhaps
some troubleshooting thrown in. Like some system operators, though,
since he really likes computers and thinks of them as both a hobby and
a profession, tonight he is planning a special diversion: COBOL, in¬
stead of cards.
But on this particular night the routine is broken by some puz¬
zling activity on a VAX superminicomputer at the corporation’s top-
secret research center.
George, Al’s colleague at the neighboring station, is browsing
through the usage logs that record the activity of all the computers in
MegaCar’s far-flung network. As he does, he happens to notice that
the VAX is working hard-very hard. Even though the log shows only
one person using the computer, the workload on the machine’s central
processor is high enough for ten or more users.
It all starts with a few quiet words.
“Al, I think something weird is happening on the net.”
“Which node?” Al replies, putting down his COBOL text and
mentally preparing for a debugging job that might take thirty seconds,
and then again might take all night, to clean up the problem.
“4316. That’s one of the R&D hosts in New York.”
“The New York VAX? What’s wrong?”
“I don’t know. Why don’t you echo terminal 23 and see what you
can make of it?”
“Right”
Al pulls his chair closer to his computer console, puts both hands
on the keyboard, and rapidly taps out a string of commands. Then he
sits back and watches the central display monitor, as row after row of
glowing green letters and numbers march across the screen. The cen¬
tral monitor is showing him everything that is happening on the VAX
computer halfway across the country, in New York.
3
0 if T OF THE INNER CIRCLE
After a few seconds, A1 reaches for a telephone.
“George, get me the name and home phone number of account
STD123 ” AYs voice betrays his concern. His simple check of the ac¬
tivity on the VAX has made it obvious that something is wrong. The
exact nature of the problem is not clear, but A1 is certain that this is no
run-of-the-mill software glitch. Either someone has been authorized
to use excessive amounts of computer time every hour without letting
the system operators know — or someone is doing something they
shouldn't be doing with that computer.
As soon as the account holder's name and phone number appear
on his screen, A1 makes the call. “Hello, Dr Saunders? This is A1
Frankston, the head system operator at the computer center. Sorry to
disturb you at this hour, but we're reading some strange activity on the
VAX. Are you using your account on that computer right now?”
Like many other high-level personnel at the research center, Dr.
Saunders has a computer terminal at home, so he can use the central
computer via telephone link if he wants to have access to the day's
research results or continue his own research. A1 and George look at
each other, as if to say, “Are you thinking what I'm thinking?” George
listens to Al's phone conversation with interest as he continues to
study the computer display still echoing the VAX's puzzling activity.
“Thank you,” A1 replies, as Dr. Saunders confirms that he is, in¬
deed, using the VAX. “Oh, one more thing ” he adds. “Would you tell
me your social security number?,.. No, it isn't anything significant.
It's just a little mix-up with our user account numbers. We'll have it
straightened out by morning. Good night”
Although he can see the same thing A1 sees by looking at the dis¬
play screen of his own console, George wheels his chair over to AFs
station and watches with raised eyebrows as A1 verifies the social se¬
curity number he's been given.
“It checks out,” A1 says, sounding puzzled.
“You mean Dr. Saunders really is logged on now?” George asks,
almost disappointed. “I was half hoping the account was being used by
that hacker we almost caught last week.' 7
A1 looks back at his screen. “No, I guess not— But there has to
be a reason for that phantom time ” he mumbles, scratching his chin.
4
PROLOGUE
A loud voice suddenly breaks the quiet in the control room. “Hey
All” a technician half shouts from the other side of the room. “There’s
a message for you coming over the laser printer. I think you better
come and take a look at it."
A1 and George exchange a quick glance, knowing looks creeping
onto their faces. They leave their workstations and walk to a printer
about the size of a washing machine. Pieces of paper are quietly drop¬
ping into a large bin at the rate of about one sheet per second. George
grabs one of the pages.
There is a large headline at the top: “A note to the chief system
operator on duty.” Below that, in slightly smaller type, are the words
“Please make sure the sysop reads this. Thank you." In normal type,
the message continues: “It should be noted that computer print-outs
currently are not legal evidence in court.”
George starts to read the message aloud, his voice a mixture of
annoyance, admiration, and puzzlement. “It is our opinion that you
should be more careful about your design plans for the TRX project.”
His voice drops and grows more serious as he reads the next sentence.
“One of us suggested that maybe we should sell the information to an¬
other car company.”
Now, A1 starts reading over George’s shoulder - and they both
read silently. “Several of us don’t think there is anything wrong with
ripping off a company as big as yours. But some of us think that indus¬
trial espionage would break our unwritten hacker laws. We may vote
on the subject in the near future. In any case, we would like to have one
or more unlimited user accounts so that we do not have to go to the
trouble of calling your ALF node by way of SYSNET12. We can’t use
1200 baud through SYSNET12. Of course, if you decide to grant us a
little assistance of this sort, it could be that we would all be more
kindly disposed toward your institution when we vote on what to do
with the TRX data.”
“What do you think?” asks George.
A1 is leafing through the now very large pile of paper in the out¬
put bin. “They’re all the same. What’s TRX?”
George thinks momentarily. “I don’t know. They must have
made it up. It has to be a bluff.”
5
OUT OF THE INNER CIRCLE
Seconds later, as if on cue, another printer starts shooting out
more sheets of paper. A1 looks grim when he sees what these latest
mystery sheets have to say. “Well, maybe they’re bluffing about selling
the stuff, but I don’t think they’re bluffing about having it. These look
suspiciously like design memos for next year’s car!”
A1 studies the new sheets for a minute, then continues, tension
rising in his voice. “We still don’t know where those hackers are! All
we know is, they’re not using Dr. Saunders’ account.”
Suddenly, a new thought dawns on them, and they almost run in
their hurry to get back to their workstations. Both sysops look at their
screens. “They may have altered the monitor program on my terminal
so I can’t find them or their account,” A1 mutters, sounding hopeful.
“But if they did, they may not have changed the programs that run on
our other terminals. I’m going to break out of my version and use
some of the other monitoring programs - see if there is anything dif¬
ferent between mine and the others’ log-on sequences or lists of ac¬
count names.”
After several minutes of frantic typing, George walks over to
Al’s station. He looks at the screen, pondering something, then he
walks back to his own station, glances at his own screen, and bursts out
in surprise, “Someone new is logging onto the VAX. Turn your moni¬
tor program back on.”
A1 stops his checking and runs his monitoring program. “That
‘someone’ is using an old test account. 1 could have sworn we killed
them all months ago,” he says.
George is watching the same display. “Funny, but I thought so,
too. Either we let that one slip, or those hackers reactivated it. But it
doesn’t make any difference. No one’s authorized to use that account
now, anyway, so....”
“Right. So we have our hacker!” A1 sounds proud of himself. He
has been worried, but now the game is over. “Let’s break in and let him
know how we feel before we throw him off the system.”
“Oh, yeah,” says George sarcastically. “And while you’re at it, ask
him how he got that valuable data.” George holds up one finger, as if
counting. “And then see what he plans on doing with it.” He holds up a
second finger. “And find out how...”
6
PROLOGUE
A1 interrupts: “Okay, okay. So we still have a lot of work to do.
Let’s get started.”
They both go over to a single terminal and A1 starts to type. He
uses the monitoring program to trace the source of the intrusion, then
gives the system a few commands that allow him to break in and com¬
municate with the person using the unauthorized account. Then, he
types: “OK. We know who you are and what you did. Either cooperate
or we will press full charges.”
After a short pause, a rapidly typed reply appears on the display
screen: “Yeah, sure. I guess you guys are just too smart for me. Any¬
way, all humor aside, I was just sent to this account by my friends to get
your reply to our offer. Have you decided to give us those unlimited
accounts yet?”
A1 chuckles while he types. “Why should we? We can just have
you arrested! Besides, it isn’t our computer. We can’t just decide to as¬
sign an unlimited account to somebody outside the corporation.”
The hacker types back: “Oh, so you’ll just call up the police and
say, ‘There’s this hacker on our system and we suspect he just may be
somewhere in the 50 states. We can’t be sure exactly where...?’ It’s
never worked before, but what the hell-go ahead and try. It’ll be fun.
Meanwhile we’ll play with this TRX stuff.”
George now pushes in front of A1 and commandeers the key¬
board, typing: “We have you traced. We know who you are and where
you are. We just want to ask you a few questions.”
“About security, right?” the hacker types back. “Well, I’m sure
you will have no more security problems if you help us out. You have
fairly good security without our advice. Only the best could have done
what we’ve done. And that’s who we are: the best. So I guess you could
say that your future security problems are pretty much up to us. There
is another possibility, though.”
George, still at the keyboard, hesitates a moment, then types
back: “And what’s that?”
“Well, we could post our information about your system on a few
bulletin boards. Then a few hundred lesser talents would try to log
on. I’ll bet a crasher would have fun with this VAX or that beautiful
DEC-20 in Detroit. And there’s always the possibility that another
7
OUr OF THE INNER CIRCLE
large car company would let us use their system in exchange for the
data we have. You can never tell about these things.”
A1 is not amused. He snaps a pencil in half while thinking over a
reply. George is almost speechless. “Arrogant little...” he is beginning
to say, when A1 finally types: “We’ll have to think about this. You guys
might just be half as smart as you think you are. By the way, how do
we reach you? Can you give us your phone number?”
“I’m glad the bad news hasn’t ruined your sense of humor,” re¬
plies their distant adversary. “Let’s just say that we’ll get in touch in
our own way, in our own time. The way we always do. In the mean¬
time, I guess it wouldn’t hurt to give you a little tidbit for your trouble.
Why don’t you tell all your users that SECRET is a lousy choice for a
secret password? I’ll bet I’ve cracked a dozen systems with that one.
Stay tuned. And keep designing those sexy cars. Bye.”
Although, in actuality, hackers and most system operators tend
to speak a much less comprehensible language, and most hacking ex¬
periences tend to involve much less conspicuous companies, hackers
did manage to find and look at secret design specifications and test
results. These particular hackers did not attempt, or ever intend, to sell
or trade “MegaCar’s” priceless files to a competitor... but someone
else might not have been so “honorable.” That’s the point of this book,
and if you are concerned about computer security, whether as a com¬
puter professional or as an interested citizen, I hope you will benefit
from what I learned as The Cracker, inside the Inner Circle.
CHAPTER ONE
Inside the Inner Circle
T
* here’s been a lot of publicity about long-distance tapping into
the programs and information files of large computer systems. So
much, in fact, that many people who meet me for the first time are
somewhat surprised and say something along the lines of, “You’re not
what I expected.”
Movies, television, and news articles have characterized hackers
as everything from technological delinquents to playful whiz kids who
can start the countdown to World War III - even before they have
learned to swim. Where’s the truth? Probably somewhere in between.
So perhaps the best way to introduce you to hackers and hacking is by
presenting my “credentials.”
My name is Bill Landreth. I am nineteen years old, and I live in
southern California. About a dozen members of the FBI and quite a
few members of the hacking community, however, know me better as
The Cracker, one of the leaders of an “invitation-only” group of
hackers called the Inner Circle. I began hacking when I was fourteen.
9
OUT OF THE INKER CltClE
GETTING
STARTED
but my career came to a rather abrupt end in 1983, when I was caught
and indicted for computer fraud - tapping into the GTE Telemail com¬
puter network based in Vienna, Virginia. Since then, I have been con¬
victed of the charge and am now serving three years’ probation.
If you are wondering what I am like, I can tell you the same things
I told the judge in federal court: Although it may not seem like it, I am
pretty much a normal American teenager. 1 don’t drink, smoke, or
take drugs. I don’t steal, assault people, or vandalize property. The
only way in which I am really different from most people is in my
fascination with the ways and means of learning about computers that
don’t belong to me.
It was mid-1979 when I got hooked on computers. I was fourteen, and
I had just brought my first computer home from Radio Shack. It was a
TRS-80 Model I, Level II, with a whole 16K of memory and a cassette
tape drive for “mass storage.” With tax, the entire system came to just
under $1000, half of which came from my savings, and the other half
from my parents. I spent all my after-school hours learning how to
operate this computer, and soon found that no matter how much I
thought I knew, there was always more to be learned.
Like many computer enthusiasts and almost all hackers, I taught
myself how to program — from reading books and looking at other
people’s programs, and by asking questions of friends. For the first six
months, I kept busy learning BASIC. There was always a new com¬
mand to learn that would make programming a bit easier, and as I be¬
came more familiar with BASIC, there were all sorts of tricks I could
figure out to make my programs run better or faster, or to do things
I had thought were impossible. After becoming comfortable with
BASIC, I started all over again with a new language and, soon after
that, I started to teach myself Z-80 assembly language, which is a
humanized version of the computer’s own internal machine code.
This kind of learning was a welcome change from schoolwork.
Programming was never boring, and there seemed to be no end to
what I could learn about it. Best of all, I could study what I wanted,
whenever and however I wanted to. No matter what language I was
10
CHAPTER ONE inside the Inner Circle
using or what specific goal I had in mind, it seemed that there would
always be something interesting left to learn,
With computers (as with most other subjects, I suppose) one
thing leads naturally to another, and while 1 was becoming fluent in
assembly language, I found that I was also learning more and more
about the machine itself. I still wanted to know about all the various
computer languages, but now I also wanted to know about the inner
workings of all computers.
One of the aspects of the TRS-80 that fascinated me most was the
intricacy of its operating system, the set of programs that told the
computer how to run itself - how to “understand” what I typed, how
to display information, how to keep all its parts working in harmony.
Like most operating systems, the TRS-80’s included a small number of
very basic commands that any user had to know in order to operate
the machine successfully, and a larger number of more complex com¬
mands that only avid programmers would care about.
I was no longer interested in simply using the machine. 1 wanted
to find out for myself what made it tick, and the operating system of¬
fered a wealth of information. The farther I went, the more I learned
about the way these programs were structured and the way they con¬
trolled the operation of the computer. Eventually, my interest in the
insides of my TRS-80 took me to bigger and better things: mainframe
and minicomputer operating systems, which are orders of magnitude
more complicated (and hence more fascinating) than a personal com¬
puter’s operating system. But the TRS-80’s operating system is still
where it all began.
Just about the time I was beginning to feel I understood my TRS-80,1
got an Apple II. I had owned the TRS-80 for about a year when my
parents, who recognized my mania for computers, bought the Apple
for me. The learning and exploring started over again, but this time it
moved more quickly, because I now had a foundation to build on.
Everything I’d learned and done up to this point, of course, was
perfectly legal and no more-or less — involved than any other enthu¬
siastic hobbyist’s efforts would be. Then, I found out about the truly
big and powerful computers called mainframes, minicomputers, and
The
Magic Door
11
QltT OF F K £ INNER CIRCLE
superminis. The kind that are often used from a remote location, via
an ordinary telephone line.
It all started soon after I got my Apple, when I acquired a dumb
terminal. If computer terminology is new to you, a dumb terminal is
a “brainless” keyboard-and-screen device; it does not have any com¬
puting power of its own, but it does allow you to hook up to other
computers, which can be around the corner or around the world,
wherever a cable or a communications link can connect the two ma¬
chines. I didn’t acquire a dumb terminal because I wanted to break
into big computers. In fact, the situation was exactly the reverse: A
friend loaned me the terminal, and in the process of finding out what
to do with it, I discovered the world of minis and mainframes.
Since this borrowed terminal had a built-in communications de¬
vice called a modem, I discovered that I could connect the terminal to
other computers over my home phone line. At first, I used the terminal
to call up the numbers of some bulletin boards I knew of. As the name
implies, bulletin boards are message-mediating computers that act as a
kind of information center for the computer community, Anyone who
knows how to do it can set up a computer as a bulletin board; many
computer clubs and other special-interest groups use them exten¬
sively. In fact, private bulletin boards later became an important way
for Inner Circle members to exchange information, and one in particu¬
lar — illegally set up on the GTE Telemail network - led to the retire¬
ment of The Cracker.
When I was a newcomer to telecommunications, however, there
were only a few public, non-hacker bulletin boards for me to choose
from - one was local, and there were another five to seven within my
area code. 1 found out about them through various hobbyist maga¬
zines, but no one ever seemed to use these things.
Then, a friend told me he knew the phone number to a large
corporate computer. He had no use for the number, so he gave it to me,
and I called it.
By all rights, that first attempt should have been my last. Sure, I
had called the number and the computer had answered, but now what?
A large, multi-user computer doesn’t sit there and chat just because
you feel like calling. It has to keep track of who’s doing what, and
12
[ B A P I E ft ONE Inside the Inner Circle
when, and it does so by “crediting” every task, no matter how large or
how small, to someone’s account—an account that can only be used by
giving the computer an account-name/secret-password combination it
recognizes as valid. No account, no access; as far as the computer is
concerned, you don’t exist.
After calling and seeing the computer’s prompt for an account
name, 1 started to try first names. For some unknown reason, I stuck
to three-character names and tried the same ones as both the account
name and the password. First, I tried DAN. No luck. Next, I tried JIM.
Nope, too bad. My third try was LEE. Against odds no gambler would
ever bet on, it worked. My luck was incredible: Three tries, with no
clues, and I hit on a valid account/password combination.
It’s hard to describe all the excitement 1 felt when LEE unlocked
the magic door to that corporate computer. I was expecting to see
ACCESS DENIED for the third time; instead the screen cleared and
the name of the company that owned the account appeared on the
screen. I guess a winner of the Irish Sweepstakes must feel the same
way I did then; 1 really thought I had no chance of getting into that
computer. To my surprise and delight, my first attempt at hacking on
an unknown computer was a success! I had opened the door to a whole
new kind of computer to learn about. But what was on the other side of
that door? And how was I going to find my way around once I got in?
Soon after getting onto that first system, I discovered that I didn’t need
a users’ manual for guidance. All I had to do was type HELP, and the
system would teach me how to use it. It wasn’t a complete blabber¬
mouth, since it did refuse to tell how to get more accounts. But before I
was discovered by the system operator about three months later, I had
learned enough about the operating system to have discovered about
thirty accounts. It was here that I learned just how complex a com¬
puter can be and came to respect the amount of time and effort that
had gone into making the operating system work. Hundreds of people
may have worked hundreds of hours each to make this system what it
was, with each person contributing a little bit to the whole. The sys¬
tem was so big, so complex, that not even they could know every
possible detail about it.
Learning
The Ropes
t3
OUT OF THE INKER Clttll
While I was exploring that first computer, I was also using the
dumb terminal to look around for interesting microcomputer bulletin-
board systems. Eventually, I ran across a few bulletin boards that were
used by “software pirates”- people who trade illegally copied com¬
puter software with one another. On these boards, I would run across
a bit of information on “hacking” every now and then.
I wanted to get more involved with larger computer systems, so I
established computer contact, through these bulletin boards, with
those few people who called themselves hackers. And through these
contacts, I soon found that there were many more of these bulletin-
board systems around the country. Each one of them offered more
information for me to try out — new phone numbers, account names,
passwords, special tips, and so on.
As I used and tested all this new information, I expanded my
knowledge of different operating systems running on different main¬
frame computers. Up until then, I had learned how to use the “help”
feature to learn the basic operating commands, and I had learned to
look for “test” accounts that had been set up (and never deleted or
deactivated) when the system was installed. But when I started com¬
municating with other hackers, I learned what types of commands are
likely to be on any operating system, and I learned how to find them.
I became familiar with the ins and outs of the most common operating
systems, and I found out about some of the security weaknesses of the
most common systems. I also learned, through trial and error as much
as anything else, how to go about trying to acquire more powerful
accounts on a particular system. An account with a programmer’s
privileges, for example, would, by its nature, allow me to control the
system more than, say, a data-entry clerk’s account. Once I started
putting this knowledge to work, I could start trading information with
other hackers.
The Hacker’s Information is the currency of the hacker’s bulletin-board culture, and
Currency trading is the means of exchange. Accounts take a lot of work to get, so
most hackers are unlikely to post information publicly, when they can
trade it for more information from other hackers. In addition, an aver¬
age hacker only acquires four or five new accounts in a year, and all
14
CHAPTER ONE Inside the Inner Cirele
but maybe one of these accounts die within six or seven months. That
same hacker could, however, trade those four or five accounts four or
five times each, and those exchanges would net him as many as
twenty-five different accounts for the year.
A more important reason for trading, though, is to keep account
information out of the hands of novices. Often, when novices get hold
of publicly posted information, they abuse it by sending obscenities to
the system operator, destroying information, changing passwords, or
removing accounts. Moral arguments aside, hackers dislike this kind
of abuse, because accounts that are abused die quickly.
Obviously, I wasn’t born a high-level hacker. Like many newcomers
who later turned to me for advice, I sought information from those
more experienced than I. For example, one very good hacker who
called himself Bootleg showed me the power of large networks. Basic
information like this is very important to a hacker. It also isn’t much
good without the skills that can only be developed through practice.
And either a high degree of skill or a sense of hacker ethics (more on
this shortly), is needed to keep this information from becoming dan¬
gerous to computer systems and the information they contain. Both
my own feelings and the things I learned from hackers like Bootleg
taught me these lessons — and served to whet my appetite for more
knowledge, the kind I could discover on my own.
When I first became involved with hacking, I learned that I was
not expected to leave my real name anywhere. In fact, it was consid¬
ered fairly stupid to do so. Everyone involved with hacking chose a
“handle,” like Bootleg, that was used as a name on all the hacker
bulletin boards. I chose to become The Cracker, and set out to estab¬
lish a reputation among other hackers.
I could have decided to stay low-key, but I was eager to gain more
information than I already had, so I posted messages on hacker bul¬
letin boards, advertising that I was willing to trade any information I
had for any information anyone else had. I was a novice in this new¬
found “brotherhood,” but I realized that I could be accepted as a bona
fide hacker relatively quickly by trading only the highest quality infor¬
mation. (In most cases, “trade information” means “I’ll give you what
Becoming
The Cracker
IS
Our OF THE INKER CIRCLE
FORMATION
OF THE
INNER CIRCLE
you need now, and next time you get something good, let me know”)
Within a few months of my first postings, the word started to get
around: The Cracker is OK.
I learned as much as I could as fast as I could, and after several
months of intensive hacking and information-trading, The Cracker
was no longer a novice. I knew a lot about hacking by then, and be¬
cause I liked to share what I knew, I gained the reputation of being
someone to go to if you were having trouble. Others hackers began to
request advice, and I continued to improve the quality of my infor¬
mation and knowledge by exploring as many computers as I could
find. In many cases, another hacker would ask me to try an account to
see if I could figure out what system it was on and who owned it. I got a
lot of exposure to different machines that way.
After a while, people would leave messages saying, “1 know you
can’t help me, but I would like to get onto this system... ” To their
surprise, I could usually help out. They needed someone who knew
more about a particular operating system than they did — someone
who had perhaps seen the inside before-or who might have a few new
ideas about how to guess passwords. As The Cracker’s reputation
grew, answering such requests became a matter of pride. No matter
how difficult the question happened to be, I would sit at the terminal
for five, ten, twenty hours at a time, until I had the answer.
When I first started hacking, it took a while to find other hackers.
Hacker bulletin-board systems were few and far between. But a year
later, things started changing rapidly. The microcomputer revolution
was putting thousands of machines into thousands of homes every
week, so the number of people who began to explore telecommunica¬
tions and large computers increased dramatically in 1981 and 1982.
New hackers popped into the networks every day.
During this time, it became very difficult to tell who it was safe
to trade information with. Sometimes, the person you gave the in¬
formation to would abuse the account himself, thus rendering it use¬
less to you. Other times, the person you gave the information to would
post it publicly and claim that it was he who took the time and effort to
16
CHAPTER ONE Iniide the Inner Circle
get the account - still rendering the account useless to you, but also
using your hours of work to better his reputation. In any case, if you
gave information to the wrong person, you probably would not get
anything in return.
It was during this time that the Inner Circle was formed, and the
person most responsible for its formation was the person who taught
me the most about hacking. His handle was Alpha Hacker. I “met” him
through one of the bulletin boards, and it was clear from our first com¬
munications that he was a hacker among hackers. We have never met
face to face, and I still don’t know his real name, but he introduced me
to several key hacking techniques. Alpha knew tricks that I had never
dreamed of.
When I was a beginner, Alpha Hacker had been one of those who
appreciated the quality of my information. He had been able to gain
access to a number of powerful accounts as a result of what he learned
from me, and we began to exchange messages. It became obvious to
both of us that we were two of a kind and, like any specialists, we en¬
joyed the opportunity to learn from each other as much as we enjoyed
solving problems for other hackers.
Alpha Hacker told me he was interested in forming a kind of
high-level hackers’ guild, because of his concern over who might get
their hands on the most useful and sensitive pieces of information we
turned up. The concept of the Inner Circle was that the best hackers
would meet on private bulletin boards and post their information for
other members to see. We would create password-based security sys¬
tems on these special bulletin boards - security systems strong enough
to resist the efforts of other hackers. With these systems in place, we
would not have to worry about trading information; all we had to do
was place information in the message base and check back every now
and then to see what was there.
The Inner Circle was formed in early 1982, when Alpha Hacker
called me with the idea (he was one of the few hackers to whom I had
given my phone number). I agreed to join, and we started to pick out
the hackers we both wanted to invite into the group. We picked the
best hackers that we knew - those who seemed to fit in with our con¬
cept. And to make sure we kept strict control over membership and
17
OUT Of THE INNER CIRCLE
Membership
Requirements
over the way information was used, we decided to form a kind of tri¬
bunal that we called the Inner Circle Seven*
Our organization and our membership policy actually turned
out to be a very timely idea (from our point of view, anyway), because
not long after we formed the Inner Circle the movie War Games was
released, and in its wake came a flood of eager-beaver new hackers* In
a matter of months the number of self-proclaimed hackers tripled,
then quadrupled. You couldn't get through to any of the old bulletin
boards any more - the telephone numbers were busy all night long.
Even worse, you could delicately work to gain entrance to a system,
only to find dozens of novices blithely tromping around the files.
When Alpha Hacker and I were deciding whom to invite into the Inner
Circle and whom not to include, we kept two different requirements in
mind* First, we wanted to make sure the members were good hackers.
Each member had to have proven he could get good information on
his own. That way, we would be assured that each member could, and
would, contribute to keeping the Inner Circle's information base at a
fairly high level. Second, we agreed that every hacker in the group
must be the kind of person who could be trusted not to abuse account
information given to him by other hackers.
The fact that we tried to invite only those people who already
met these two requirements quickly resulted in an unwritten “code of
ethics” that was, and remained, the philosophy that held the Inner
Circle together. This code had two practical uses for our group. The
most apparent was that information we gathered would remain use¬
ful for a longer period of time* But just as importantly, our approach
served to keep the system operators on our side. If the code had ever
been written, it would have looked something like this:
= No Inner Circle member wilt ever delete or damage information
that belongs to a legitimate user of the system in any way that
the member cannot easily correct himself
~ No member will leave another hacker's name or phone number
on any computer system. He will leave his own on a system only
at his own risk.
13
CHAPTER ONE Inside the Inner Circle
= All members are expected to obtain and contribute their own
account information, rather than use only information given to
them by other members.
We had many good reasons to follow these basic rules. But the
most important, as far as the Inner Circle was concerned, had to do
with the basic principle of respecting other people’s property and in¬
formation. We were explorers, not spies, and to us, damaging com¬
puter files was not only clumsy and inelegant - it was wrong.
In fact, we had one occasion to test our beliefs a few months after
the Inner Circle was formed. One of our members, who went by the
handle Mandrake, had deleted some information and, in general, had
caused trouble on a computer system. When asked if and why he did
it, Mandrake said yes he did - because he was bored. Very soon after
we heard about the incident, we closed the Inner Circle to him. Of
course, that meant changing the password procedures on all of our
secret bulletin boards. We didn’t want to go to that much trouble very
often, so we screened new applicants more carefully after that, and
even at the height of our activities, in mid-1983, the Inner Circle num¬
bered no more than fifteen.
The Inner Circle was a strong group, and we found there was a definite
advantage to making it easy for the best hackers to interact with one
another. But I’d like to emphasize that the Inner Circle was interested
in computers - not in the organizations that owned and used them. At
least 95 percent of the institutions whose computers the Inner Circle
penetrated would not interest anyone.
On the other hand, you are no doubt curious about what we saw,
and this is probably as good a time as any to satisfy that curiosity. To
protect the privacy of the institutions involved, I will not mention their
names or give you any specific details that I think might compromise
their computer systems.
At one point, an Inner Circle member discovered a demonstration
computer that was owned by a very large banking firm. The account
INNER CIRCLE
CAPERS
Bank
19
OUT Of THE INNER CIRCLE
name and password were obvious: BANK* In itself, this account was
not worth very much. It showed you a menu of options that looked
quite powerful, but the menu was only a simulation, intended to give
first-time users a flavor of how the system worked. This demonstra¬
tion system was not useless, though, because I was able to break out of
the simulation program and get into the actual operating system.
The system itself didn’t have anything that was new to me, so I
was quickly bored with it, even though I saw messages that were the
actual substance of multimillion-dollar transactions. Someone naive
or someone whose passion was for money, rather than knowledge,
could have found the sight very. *. intriguing, even though, in most
cases, a hacker would have little, if any, hope of transferring funds. On
the other hand, I do know of a case in which someone stumbled, purely
by accident, right into the fund-transfer system of a different com¬
puter. Hmm_
Newspaper At one time during the height of the Inner Circle's activities, one of
our members found a computer on a large network that did not seem
to do very much. Whenever we called it, the computer would send ! as
a prompt to our terminals, but we could get it to do nothing more. Not
very exciting*
Of course, right away we tried all sorts of things* We tried HELP
and INFO, which are built into many computers to keep users from
getting lost. We tried the old standards, such as LOGIN and HELLO.
When words failed, we tried various control-character combinations;
Control-E, for instance, sometimes causes a computer to identify it¬
self. None of these obvious tactics worked.
One day, I was trying a few things that we may have missed, and
discovered that when I typed in the letters OPEN, the ! prompt was
replaced with #*
I tried O P E N a second time. It worked again, and this time the
distant computer replied READY TO TAKE INPUT. I had to assume
the computer was waiting for a message of some kind, and I knew
that if I was supposed to enter a message, I would also need some
way of telling the computer when I was through* J hit the return
key; when that didn't work, I started pushing various characters
20
CHAPTER ONE inside the Inner Circle
to try and tell the computer I didn’t want to input anything. I very
soon found that hitting Control-X got the reply INPUT ACCEPTED,
and a few seconds later, I saw:
1 - SEND STORY TO WORD PROCESSING
2 - SEND STORY TO EDITOR
3 - SEND STORY TO WIRE
4 - ABORT STORY
I tried hitting the return key at this point, and received a message
telling me to call a certain phone number for help, if needed. I decided
instead to abort my nonexistent story, hoping that the owners of the
computer would not notice my incursion and, perhaps, increase se¬
curity. Right after I made my choice, the computer hung up on me.
I did call the phone number I’d been given, and reached a large
newspaper based on the East Coast. When I told the Inner Circle what
I had learned, we realized that, if we discovered the correct format for
submitting stories, we might have stories of our own printed. Though
it would be all but impossible to print a major falsehood - because of
the checks that exist within the newspaper - printing fairly normal,
well-written stories containing subtle messages or jokes should not be
a major problem. Knowing was better than doing to the Inner Circle,
though, so we never used this service.
During one of our travels, this time to a computer in Texas, we ran
across a group of high-school students who were using various ac¬
counts to do their computer-programming classwork assignments.
They were using BASIC to write programs to do simple things, such as
figure the amount of interest paid on a loan, or find the prime numbers
between 1 and 10,000.
The computer itself held little interest for us, but because we
thought that a few of the high-school users could be hackers on the
side, we started to look around the system. These students were not
very advanced in the computer field, so it wasn’t too long before we
found a few programs that had been written incorrectly. We decided
to help out a little bit. Each of us chose one student and rewrote the
program the student had undertaken. We did it using programming
School
21
OUT OF I H E INMES CIRCLE
Phone Company
techniques that were far beyond the BASIC they were using, and to
avoid confusing anyone, we were careful to document our own ver¬
sions well, so that both the students and the teachers could learn from
the experience.
Sometimes, it is not the computer that interests a hacker the most, or
the name of the company, or even the information on the computer.
While rare, it sometimes happens that the procedure of the company
interests us more than anything else. It would greatly interest us all,
for example, to learn exactly how the FBI went about keeping track of
us, or to learn what plans NASA has to make sure its funding is contin¬
ued. In this caper, the Inner Circle learned a little about how phone
companies operate.
I should note that the term telephone company can mean one of
many different companies. Since the breakup of the Bell system, not
only are there different telephone companies in different locations,
there can also be a choice of different phone companies in a single
location. In some places, a telephone company’s computers can actu¬
ally be accessed by outside callers. Because of a few fairly recent high-
publicity cases, however, phone-system computers have become quite
secure in most respects.
Phone companies attain this level of security by having more
than one system. Different systems are used for different things and,
in most cases, only one of them is always available for outside access.
Generally, one computer system is required to be available to
other branches or to other phone companies to simplify billing. This
system is “secure,” because information cannot be changed - it can
only be seen. I have limited experience, and only with this particular
system, but I assume that all phone-company computers are somewhat
similar: A person from one branch of the phone company calls the
computer that is local to the customer in question. The caller then en¬
ters a password (usually only a password, as far as I can tell) and the
customer’s phone number. The result is a page or more of customer
billing information in a format similar to your monthly phone bill. A
hacker’s uses for this information would obviously be limited — say, to
find out who owns phone number 555-9483, or to see how many times
22
CHAPTER ONE inside the Inner Circle
an employee is calling someone at a rival company every month. For
the most part, it was just interesting to know something that most
people didn’t know about the phone company.
The problem with a credit bureau is that it must be accessed by a large
number of people. The twenty-year-old salesman selling a stove to a
couple has just as much right to check on a person’s credit as the com¬
pany selling a $500,000 yacht to a millionaire.
In many cases the person needing the information never uses the
computer directly, but he still needs the information. This need for ac¬
cessibility makes the computers that hold credit records-yours, mine,
and everyone else’s — fairly non-secure because, even with the most
expensive and careful procedures, there are still those people who
need the information and must have access, And, as you’ll see later in
this book, people are the weakest link in the security chain. I doubt
that five minutes ever passed when members of the Inner Circle didn’t
have all the information they needed to get credit information on any¬
one they would have liked to check on ... and we certainly weren’t the
first. Police have reported that prostitutes and drug dealers have
sometimes been known to have access to credit information, too.
This kind of information is potentially much more damaging
than you might first think. For starters, access to it is a pure and simple
invasion of privacy. Second, unscrupulous people could use other
people’s credit and names for about any purpose the rightful owners
might - including credit cards, social security, or credit rating for the
purpose of getting a loan.
Credit
CHAPTER TWO
A Look at the Past
T
X he term hacker goes back about twenty years, to the days of
antiseptic computer rooms and stacked boxes of punched cards that
you were told not to “spindle, fold, or mutilate/ 7 In those days, like
now, a hacker was someone who simply wanted to eat, breathe, and
sleep computers.
As computer technology has evolved, however, the definition of
a hacker has taken on different shades of meaning, too. In the late
1960s to the mid-1970s, the term hacker was applied to anyone doing
anything with computers, but especially to someone who worked on
programming the machines. Then, from the mid- to late-1970s, a
hacker was someone with enough of a love of computers to build his
own from the limited resources of the time. Later still, between 1979
and 1981, a hacker was most likely someone so fascinated by comput¬
ers that his involvement with them approached or passed the point of
“working too much" - this was the “classic" hacker who ran around
with a calculator in one pocket and pieces of computer in the other.
25
OUT OF THE INKER CIRCLE
THE SIXTIES
HACKER
Then, starting about 1981 or 1982, the personal-computer mar¬
ket burst open. Software and hardware were designed to allow freer
communication than ever before between large and small computers.
This brought about the most recent change in the definition of a
hacker: A person who often attempts to gain unauthorized access to
large systems by using his personal computer equipment,
The recent publicity about the movie WarGames and the arrests
of teenage hackers, such as the Wisconsin group that called them¬
selves the 414s, has brought the term to the attention of the public for
the first time. As a result, 1 think the latest definition is probably here
to stay, This chapter, though, is mostly about earlier “breeds” of hack¬
ers who, whether they ever dreamt it or not, had an effect on the
hackers of today
Back in the early 1960s, in the primitive days of hacker history long
before ordinary teenagers could afford to install personal computers
in their bedrooms, a group of young people about the same age as
today’s hackers began to create a new culture. These were young com¬
puter wizards, many of them school dropouts, and they were em¬
ployed by the artificial-intelligence and computer-systems research
laboratories at the Massachusetts Institute of Technology (MIT). They
worked on a project known as “MAC” - a fabulous venture whose
initials have been (and apparently were intended to be) interpreted
as standing for Multiple-Access Computers, Machine-Aided Cognition
or, at MIT itself, Man Against Computers.
Legends say some of these first hackers were a rather motley
wild, and eccentric crew, but there was a good reason why the MIT
administration permitted them to work in this ultra-sophisticated de¬
partment (which, though few of them knew of it, was funded by
ARPA, the Advanced Research Projects Agency of the Defense De¬
partment): The MIT laboratories didn’t just use state-of-the-art hard¬
ware - they created it. These young programmers knew the system
better than anyone else, so they were more qualified than anyone else
to create the software that would bring the state-of-the-art hardware
of those days to life.
26
CHAPTER TWO i look a! the Pttl
Although they were often untidy, kept strange hours, and spoke
a language that only other hackers could understand, the MAC hack¬
ers weren’t just fringe fanatics. They were the most progressive soft¬
ware designers around, at a time when a whole new kind of computer
was evolving - a computer that would pave the way for the personal
computers of today.
The MAC hackers wrote the first chess-playing programs, and
they also worked with a computer scientist named John McCarthy to
develop a high-level programming language called LISP for artificial-
intelligence programmers to use. In addition, they were the first to put
together the sophisticated programs that are known today as “expert
systems.” But perhaps the hackers’ greatest accomplishment came
from the role they played in the creation of computer time-sharing. A
time-shared computer system is one in which several people can use
the computer at the same time, and time-sharing was a turning point
in computer evolution because it made computers more accessible to
programmers.
Up until the MAC hackers and other groups of programmers cre¬
ated time-sharing systems, programmers had no way to interact di¬
rectly with the computer. Big mainframe computers and punched
cards were state of the art. Programmers had to submit their decks of
punched cards to system operators—the high priests of the mainframe
world — and wait for the results. And the results, good or bad, came
back as a paper printout. If the program needed only one correction,
the entire stack of punched cards had to be submitted again and again.
All this was going on in 1959 and 1960, and it seemed as though
mainframes and teletype machines were doing their best to keep com¬
puters and programmers apart.
Then, the MAC hackers and their colleagues began to create a
special kind of operating system, a set of programs that would enable
a computer to interact directly with several programmers at the same
time, and to display results immediately on TV-like screens (cathode-
ray tubes) rather than on teletype printouts.
Because they created the time-sharing framework that allowed
everyone else to use the new computer system, the MAC hackers (now
called system programmers) had a certain power over the other users,
27
OUT OF THE INKER CIRCLE
including their bosses and teachers. One aspect of this power was an
ability to “crash the system” by running a particular program. A sys¬
tem crash would usually dump all unsaved data into computer obliv¬
ion, and would lock up the system until the hacker or someone else
came up with a way to fix it.
In the early days of time-sharing, crashing-testing the system’s
limits - was encouraged in the MAC project, because programs that
crashed the system did so by exploiting a bug, a flaw in the system
software. Everyone wanted to find and fix all the system’s bugs and
vulnerabilities, so this kind of deliberate horseplay was a vital part of
the whole research and development process. The hackers’ use of their
power was also a natural outgrowth of their original approach to hack¬
ing, since it implied that the person with the greatest knowledge about
the computer’s operations (and its flaws) had the right to use that
knowledge as he wished.
The hackers who created and crashed those early time-sharing
operating systems delighted in getting around any attempt to keep
them away from the computer’s resources. As far as they were con¬
cerned, any hacker who could find a way to circumvent or even de¬
stroy a barrier set up by the system operator wasn’t at all obliged to
keep from using his discovery-it was up to the system programmers
and operators to patch up any holes in their software barriers.
The MAC hackers were in their heyday ten years earlier than
the phone “phreaks” of the 1970s and almost twenty years before the
Inner Circle was formed, but they had the same fundamental beliefs
that modern-day hackers do: Nothing must prevent a hacker from
knowing or learning as much as possible about a system’s operation.
Any software barrier to knowledge about a computer system was, and
is, a challenge to all hackers.
THE SEVENTIES Our home computers can contact computers thousands of miles away
HACKER because they can use devices called modems that enable them to
“hear” and translate sounds sent over the nation’s (and the world’s)
telephone communication system. Like all giant networks, however,
the telephone system has its weak points, and one lies in the fact that
28
CHAPTER TWO 4 Look at the Pas!
a computer-to-computer hookup can occur without the knowledge of
either the phone company or the invaded machine. This is the weak¬
ness that makes the telephone system and most computer systems
vulnerable to hackers.
In the 1970s, before personal computers became as common as
they are now, the telephone system itself was explored by a group of
hackers who called themselves phone phreaks. The ethical and tech¬
nical predecessors of today’s hackers, the phone phreaks were anar¬
chic “musicians” who delighted in using flutes, whistles, and any other
sound generators that worked to enter and explore the worldwide
telephone network.
The phone phreaks were far less organized and widespread than
today’s hackers are, and, in the beginning, none of them even knew of
each other’s existence. The cult itself came into being in the late 1960s,
partly because of “phone hackers” at MIT and Stanford, where there
were large computer centers and nests of hackers, and partly because
of a brilliant young man in Tennessee named Joe Engressia.
Joe was the first phone phreak to achieve media notoriety, when
a 1971 Esquire magazine article told the world about him and his co¬
horts. Like many other early phone phreaks, Joe is blind. He was only
twenty-two when the article was published, but he had been tweaking
the phone system since the age of eight. Telephones had always fasci¬
nated him, and Joe also happens to be one of those rare individuals
who are born with perfect pitch. One day, by accident, he discovered
how this gift could help him manipulate some of the most sophisticated
and widespread technology in the world.
He was dialing recorded messages, partly because it was the only
way he knew of to call around the world for free, and partly because if
was a favorite pastime. He was whistling while listening to a recorded
announcement when suddenly the recording clicked off. Someone
with less curiosity might have assumed it was just one of those weird
things the telephone company does to you, but Joe had an idea. He
fooled around with some other numbers and discovered that he could
switch off any recorded message by whistling a certain tone.
He called the local telephone company and asked why tape re¬
corders stopped working when he whistled into the telephone. He
29
OUT OF THE INNER C I R C l E
didn’t fully understand the explanation that was given to him at the
time (remember, he was only eight years old), but it sounded as
though he had stumbled into a whole new world of things to do and
explore. And to a blind eight-year-old, an easily explored world, no
farther away than his telephone, was, indeed, an intriguing discovery.
Joe was able to control some of the telephone company’s global
switching network - which is what he had stumbled upon with his
whistling - because of a decision American Telephone & Telegraph
(AT&T) made sometime in the 1950s. Their long-term, irreversible,
multibillion-dollar decision was to base their long-distance switching
on a series of specific, audible tones called a multifrequency system.
The multifrequency system (known to phreaks as “MF”) is a way for
numbers that designate switching paths to be transmitted as tones
similar to the sounds touch-tone phones make. Certain frequencies are
used to find open lines, to switch from local to long-distance trunks,
and, essentially, to do most of the jobs a human operator is able to do.
Undoubtedly, the decision-makers at AT&T did not give a mo¬
ment’s thought to the possibility that the system might someday fall
before a blind eight-year-old with perfect pitch, but Joe found that he
could maneuver his way through the system by whistling that one
specific tone at the right time. His motivation was not to steal free
telephone calls, but to find his way around the network and to learn
how to extend his control over it.
Joe explored for years, but he never thought of himself as an
enemy of the telephone system. He loved the system. His dream was
to work for the telephone company someday, and he often tried to tell
the company about bugs he discovered in the system. But he finally
ran afoul of his intended employer when he was caught whistling up
phone calls for fellow college students.
The publicity surrounding Joe’s case had an unfortunate (for the
telephone company) side effect: It led to the creation of the phone-
phreak network. Soon after the story hit the papers, Joe began to get
calls from all over the country. Some of the callers were blind, most
were young, and all of them had one thing in common: an enormous
curiosity about the telephone system. Joe put his callers in touch with
one another, and these scattered experimenters soon found that they
30
CHAPTER TWO i lock at the Past
had stumbled upon several different ways to use the MF system as the
ticket to a world of electronic globe-trotting.
Joe Engressia may have been the “phounding phather” of the
phone phreaks, but just as one discovery often leads to another and
another, it soon happened that someone else discovered a very large
error made by the Bell Telephone System in 1954. The Bell System’s
technical journal had published a complete description of the multi-
frequency system, including the specific frequencies and descriptions
of how the frequencies were used.
Once the frequencies became public knowledge, phreaks began
to use pipe organs, flutes, and tape recorders to create the tones that
gave them control over the telecommunications network. And then
came the ultimate irony: The news spread that a simple toy whistle
included as a giveaway in boxes of Cap’n Crunch cereal produced a
pure 2600-cycle tone if one of the holes in the whistle was taped shut.
Using the whistle at just the right point in the process of making a
connection, phreaks could call each other whenever and wherever
they wanted without having to pay the phone company.
One of the more curious and inventive phreaks using the Cap’n
Crunch whistle was John Draper, a young Air Force technician sta¬
tioned overseas. Draper used the whistle for free calls to his friends in
the United States. He was interested in the way this bizarre tool
worked, so he began experimenting with the system and found that he
could use the whistle and his knowledge of the switching network to
route his calls in peculiar ways.
He began by calling people who worked inside the telephone
system. They weren’t aware that he was an outsider, so he was able to
start gathering “intelligence.” Soon, he was calling Peking and Paris,
and routing calls to himself around the world. He set up massive clan¬
destine conference calls that phreaks around the world could join and
drop out of at will. Soon, he became known to the phreak under¬
ground as Cap’n Crunch.
Cap’n Crunch soon found out from other electronically minded
phreaks that it was possible to build specially tuned electronic-tone
generators that could reproduce the MF frequencies. A few electronic
wizards began to circulate the generators, which were first known as
31
OUT OF THE INNER CIRCLE
“MF boxes” because they reproduced the multifrequency tones, and
later came to be called “blue boxes,” as they are today.
The number of phreaks grew, and as they added their own dis¬
coveries to the collection of phreak knowledge, the cult’s power to
manipulate the system steadily increased. Then, in October 1971, the
whole underground scene, from Joe Engressia to Cap’n Crunch, be¬
came well known to the outside world. Esquire magazine published
“Secrets of the Little Blue Box” by Ron Rosenbaum, a journalist who
had encountered the top phreaks of the time. Cap’n Crunch was char¬
acterized somewhat romantically in Rosenbaum’s piece as a roving
prankster who drove the author around in his specially equipped van,
pausing frequently at public telephones to phone locations around the
world: the American embassy in Moscow, a group of blind teenage
phreaks in Canada, a public telephone in Trafalgar Square.
After the article was published (though not as a direct result),
Crunch was arrested twice, convicted, and ended up spending four
months at the federal prison in Lompoc, California in 1976, and two at
Northampton State Prison in Pennsylvania in 1977. While he was in
prison, several mob-connected inmates tried to enlist him in a com¬
mercial blue-box venture. Draper/Crunch declined. The convicts
broke his back and knocked out his front teeth.
After he left prison. Draper quit phreaking and decided to start
programming. An old friend by the name of Steve Wozniak seemed to
be doing pretty well with a piece of hardware he called the Apple and
Draper started writing software for Apple Computer. He developed a
word-processing program known as EasyWriter and gained another
niche in the technological Hall of Fame in 1981, when EasyWriter was
selected as the first word-processing program available for the IBM PC.
Now, Cap’n Crunch makes a legitimate living under a new handle,
Cap’n Software.
TAP During his trial, John Draper claimed (and still claims) that his interest
in phreaking was strictly devoted to learning about the workings of
complex, worldwide communication-switching networks. There were
other phreaks, though, of a more political mind, who saw this method
of technological trespassing as a tool for spreading anarchy, and one
32
CHAPTER TWO A Look at the Pest
radical branch of the phreak fraternity grew out of the political group
of the late sixties and early seventies known as the Yippies,
On May Day, 1971, the founding Yippie, Abbie Hoffman, and a
phone phreak who used the handle A1 Bell started a subversive pub¬
lication, called the Youth International Party Line, which focused on
information about cracking the phone network. A few years later, its
name was changed to Technological Assistance Program (TAP), when
the technological phreaks separated from their more politically ori¬
ented counterparts. TAP was purely anarchist. Through it, phreaks
learned how to make plastic explosives, how to obtain phony birth
certificates and illicit airline tickets, and how to abuse credit cards. It
published circuit diagrams of blue boxes, and its members specialized
in gaining and trading hard-to-get phone numbers - the Vatican, for
example, or the Kremlin. TAP even secured the phone number of the
American Embassy in Teheran after it was seized by students during
the “hostage crisis” of 1980, posted the number, and invited phreaks
to call the Embassy to “tell off” the revolutionary guards.
In the late 3970s the phreak who had been most closely associ¬
ated with TAP also became a well-known hacker with the aliases
Richard Cheshire and Cheshire Catalyst, Often employed as a com¬
puter and communications consultant by large corporations who are
unaware of his secret identity, Cheshire has a widespread, carefully
cultivated network of cohorts inside the telephone company and other
institutions. Avoiding what he calls “dark-side hacking” that results in
damage to data, Cheshire claims that there are some kinds of informa¬
tion that even TAP will not publish. For example, Cheshire once told a
friend of mine: “A few years ago, before the Progressive magazine
actually published the plans for making a hydrogen bomb, we were
approached by someone who had similar plans. I decided that any¬
thing like the hydrogen bomb, which has the capability of destroying
the phone network, is not in our interests.”
Cheshire also mentioned an incident in which a hacker he knew
stumbled upon the data-processing facilities of a top-secret American
seismic station in Iceland, a facility responsible for monitoring Soviet
nuclear testing. The hacker got out as soon as he realized where he
was - “We try to stay away from that stuff ” Cheshire said. He also
33
OUT OF THF INNER CIRCLE
remarked, “I once invited the CIA to attend a public lecture of mine,
and there were a couple of guys at that talk, seated toward the back,
who definitely turned a couple of shades of green when I told about
that Icelandic station.”
THE EIGHTIES Those were the days when computers were still too few and far be-
HACKER tween to gain the interest of telecommunicating hackers. But during
the mid- to late-1970s, phone phreaking overlapped, and gradually
merged with, the birth of the microcomputer industry. I’m sure that
most of the Inner Circle would have been phone phreaks, if computers
hadn’t been there to lure them away, but beginning in 1975 and 1976,
electronics technology and the development of packaged software be¬
gan their headlong race into the future - one led by many of today’s
top hardware and program developers, some of whom have admit¬
tedly turned their attentions from blue boxes to big business in the
years between.
By the early 1980s, hackers were starting to come out of the
woodwork. Many people who already had an interest in computers
were now starting to learn about the rapidly advancing field of tele¬
communications. Even more people were just becoming interested in
computers. Mainframe computers began springing up all over the
place, making hacking much more worthwhile than ever before. Per¬
sonal computers were taking over the “offices of the future,” their
prices started dropping, and more and better programs appeared. The
machines themselves became faster and more powerful by the day.
IBM entered the fray with its Personal Computer and “legitimized”
the industry for conservative onlookers.
Microcomputers found their way into homes, schools, and offices
everywhere. The Inner Circle was formed and grew strong, and,
between the middle of 1981 and the end of 1982, the population of
hackers exploded to at least three times its former level.
Along with these developments, telecommunications became a
big part of the computing life. Modems became smaller, faster, and
smarter. Information networks sprang up everywhere, offering dial¬
up facts and figures on everything from the stock market to the latest
34
CHAPTER TWO A look illhe Pail
in biochemical abstracts. And during this time, hackers were busy. So
much so that some began to attract the attention of journalists and law-
enforcement officials.
The telecommunications network at this time was a wonderland
for hackers: big, exotic, complicated computers were a touch-tone
away; bulletin-board systems (or BBSs) were set up for everyone from
people seeking dates to school teachers. Hackers “met” other hackers
via private and semiprivate bulletin boards. They exchanged tips, ac¬
counts, and phone numbers, and they learned who was good and who
was not so good.
Then, the movie War Games was released. Most hackers did not
like the movie, but no matter how we felt about it, this film became a
landmark in hacking history: Many, many people decided to try hack¬
ing on the basis of what they saw (or thought they saw) in WarGames.
Handles like Warmonger, and esoteric references to Joshua (a key
name in the movie), began to appear with distressing frequency. In
fact, about seven or eight months after WarGames was released, the
system operator of one bulletin-board system 1 knew of told me that
he had perhaps 290 users, of whom only about 40 had been involved in
telecommunications for much more than half a year.
At about the same time, and probably for the same cinematic
reason, many other people began to become concerned about hack¬
ing. On the basis of one implausible, overly dramatized film, people
began editorializing about hackers, and government agencies rushed
to see whether their systems had been compromised. The FBI took an
interest. Hackers were caught, their exploits publicized, and their
computer equipment confiscated. Cases were taken to court, in the
United States and elsewhere, and questions arose: Was hacking a
threat or a nuisance? A crime or a lesser offense? Punishable? And if
so, to what extent?
One post-WrtrGmnes group that got quite a lot of publicity was a group The 414s
of Wisconsin teenagers who called themselves the 414s, after a local
area code. Joseph B. Treaster, a staff reporter for The New York Times
who has covered many recent hacker-related stories, interviewed one
of the group shortly after they were apprehended by the FBI.
35
0 U I Of THE INNER ( 1 R C l E
According to the interview, the 414s had erased a few files in an
attempt to cover their hacking tracks. They later discovered that they
had erased a file incorrectly and were unable to correct the situation.
This was bad enough from the Inner Circle’s point of view, but worse
yet was the fact that the damaged file was in a computer at the Sloan-
Kettering Cancer Center in New York. The idea that technological
vandals could, intentionally or otherwise, erase information at a can¬
cer research and treatment center was one of the aspects of the case
that everyone, including the Inner Circle, found appalling.
Another computer that these hackers compromised was located
at the nuclear weapons research facility at Los Alamos, New Mexico. I
am certain that the security people at Los Alamos are among the
minority of computer-system administrators who are absolutely cer¬
tain to keep their most sensitive systems physically sealed from tele¬
phone access. Still, it is unsettling to think that a computer belonging
to any such facility—even a computer that has deliberately been made
accessible to research scientists - can be penetrated by a group of
mischief-seeking teenagers.
CHAPTER THREE
A Look at Computers
A
JL J^side from handles, private bulletin boards, accounts, and
special phone numbers, a high-level hacker’s world is made up of oper¬
ating systems, programs, and machine code. If you don’t know a VAX
from a modem, or ASCII from an operating system, don’t worry.
While the technicalities can be very complicated, the concepts behind
computers and the way they function are simple and very logical. To
be a hacker, you would need to know much more than this book could
teach you. To know about hacking, on the other hand, you don’t need
any more information than this “tutorial” chapter will cover.
What is telecommunications? These days, it’s usually the ability to use
the telephone network to connect your home or business computer to
a computer located somewhere else. Maybe the other computer is an¬
other home computer that belongs to a friend or colleague. Maybe it is
a minicomputer or a mainframe that is located at your home office
TELECOMMU¬
NICATIONS
IN GENERAL
37
OUr OF THE INNER CIRCLE
across the country. Or maybe it is a public-access computer, such as the
ones operated by THE SOURCE, CompuServe, Dow Jones, and other
such services. In any case, the means you use to communicate with
that other computer is a small device, called a modem, that connects
your computer with the telephone system and, through that system, to
the computer at the other end of the line.
That’s telecommunications: two computers “talking” to each
other via their own translators, or modems. They need the modems,
because computer “speech” is in the form of electrical impulses, rather
than sound, and it is also very exact and very fast. The modems enable
computers to use the voice-based, inexact (by computer standards),
and relatively slow (again, by computer standards) phone system to
transfer data at speeds of up to thousands of characters per minute.
Since computers have no idea of who might be impersonating whom
over the phone system, modems also enable hackers to connect with,
and explore, some fascinating machines.
In the past few years, the technology of home telecommunica¬
tions has been racing ahead like a horse in the Kentucky Derby. Al¬
though many people may not be sure about what goes on behind the
scenes, almost everyone realizes that the mysterious “system” where
sysops and hackers play their equally mysterious games is vitally im¬
portant in the world as it exists today. Whether you know or care
about telecommunications, everything from your birth certificate to
your checkbook balance and your Social Security account is coded,
stored, and transmitted through the national and, sometimes, the in¬
ternational communications network. The groceries you buy, the
newspapers you read, the plane reservations for your vacation - all
rely on telecommunications and computer systems in some way.
Through telecommunications, we have the ability to transmit
and record information much faster than ever before. Airline reserva¬
tions are made on the spot. Funds are transferred within a few hours.
Corporate files and interoffice memos no longer depend on the post
office - they can be sent across the country as quickly as they can be
sent across town.
All of this means that a great deal of information — sometimes
very valuable information - is cither traveling from one computer to
38
CHAPTER THREE i look al Compoten
another through the telephone network, or it is accessible to a com¬
puter that can use a telephone and a modem. And, as hackers know,
this vast, intriguing network can be penetrated by a $200 computer
and a $150 modem.
All computers are run by devices called central processors, which are
the master control devices that oversee all of the other functions of the
computer. Processors are composed of the often-mentioned chips de¬
signed, developed, and produced by the electronics wizards of the
industry. Processors are also the pieces of a computer’s “innards” that
use numbers to help you turn your computer into a word processor, a
spreadsheet generator, or a video-game player, Altogether, a com¬
puter’s processor(s) and associated hardware are known as the central
processing unit, or CPU.
Given this fundamental “brainpower," you would think that it
would be easy to categorize computers according to how “smart” they
are. To some extent, they can be grouped by the strength and speed of
their processors but, as I said earlier, the technicalities can be compli¬
cated and, in the end, this basic defining characteristic becomes inter¬
twined with function, storage capacity, and other factors so that
gr oupings become as much a matter of opinion as they are a matter of
fact. As far as we are concerned, however, computers can be divided
into five basic groups: microcomputers, minicomputers, supermini¬
computers, mainframes, and supercomputers.
A microcomputer is the smallest and least powerful of the five types of
computers. It is usually defined as a computer that is run by a single
microprocessor, and a microprocessor is a central processor, or CPU,
on a single chip - an ultraminiaturized circuit that is so small it would
get lost if you dropped it on a shag rug. A microcomputer almost al¬
ways also qualifies as a personal computer, because all of its resources
are dedicated entirely to one person at a time. In other words, it can¬
not be used by several different people simultaneously.
According to these definitions, the Apple II, the IBM PC family,
the Commodore 64, and the Timex-Sinclair 1000 are microcomputers.
TYPES OF
COMPUTERS
Microcomputers
39
OUT OF THE INNER CIRCLE
On the other hand, and here is where some of the fuzziness I men¬
tioned comes into play, not all of these machines are necessarily per¬
sonal computers. The IBM PC, PC XT, and, especially, the new PC AT
can all easily be set up to divide their resources among several to many
people so, depending on function, these microcomputers may or may
not be “personal” as well.
Minicomputers The next step in the computer hierarchy is the minicomputer, which is
almost always used as a business computer. Minicomputers are usually
larger and more expensive than microcomputers, and they have the
ability to time-share, or divide their resources among dozens of users.
While the main memory of most microcomputers is measured in tens
or hundreds of kilobytes, the main memory of some minicomputers
can be in the multiple megabyte range-ten to a hundred times larger.
Main memory is a very important point when talking about or
categorizing computers, because the power of a computer depends
entirely on the kinds of programs it can run. Powerful programs are
complex programs, and complex programs require a large amount of
main memory to function. That, in fact, is one reason hackers like to
gain access to minicomputers, and even bigger machines: Suddenly,
they have the freedom to use far more computing power than a micro¬
computer can possibly provide.
Minicomputers cost anywhere from 15000 to 11,000,000, but
most are in the $20,000 to $60,000 range. Generally, computers like
Sage V, Data General’s Nova, and Hewlett-Packard’s HP-3000 are
thought of as minicomputers.
Supermini- As technology advances and new computers become more powerful,
computers the computers that a year or two ago were considered powerful and
expensive become more common. Distinctions blur, and what used to
be A now becomes B. That is essentially what is happening in the mini¬
computer category, and some “minis” that are used primarily by large
businesses now qualify as superminicomputers because their main
memory and processing speed are substantially greater than those of
regular minicomputers. Superminicomputers can cost as much as sev¬
eral million dollars, and some even have more information storage
40
CHAPTER THREE A look at Computers
capacity than the mainframe computers that are one step higher in the
computer hierarchy. The VAX you read about in the story at the begin¬
ning of this book is generally considered a superminicomputer. There
is another one, called a Prime, and both IBM and Digital Equipment
Corporation also manufacture superminicomputers.
Mainframes are the machines that usually come to mind when you
think “big computer.” They are the ones with such names as IBM-370,
DEC-20, and Prime 750. As a general rule, mainframes are the most
powerful computers in widespread commercial use. They can almost
always handle more than one hundred users at a time, they are faster,
and they can usually store more information than a minicomputer.
Supercomputers are at the very top of the heap. They are the most
powerful computers in existence, and most hackers would love to find
one. At the moment, however, there are only a few - the Cray and
Cyber computers and a few Japanese counterparts - that qualify as
supercomputers. They are used by organizations, such as NASA and
the Pentagon, that have really high-powered computing requirements.
Supercomputers are extremely fast, and one of their main features is
their ability to perform some operations simultaneously, rather than
one by one as all other computers do.
Any computer, no matter how powerful its hardware might be, is use¬
less without a program to run. You are probably familiar with word¬
processing programs, spreadsheet programs, database programs, and
game programs. These contain instructions that turn your computer
into a particular type of servant. But to allow your computer to use
these special-purpose programs in the first place, you need a special
control program known as an operating system.
Every computer needs an operating system. Without one, the
machine will never do anything: never check the keyboard for input,
never display anything on the screen, never remember anything for
you, never forget anything for you, never impassively tell you FILE
NOT FOUND.
Mainframes
Supercomputers
OPERATING
SYSTEMS
41
OUT OF I H f INNER CIRCLE
In the world of microcomputers, there are several major operat¬
ing systems, such as CP/M (which stands for Control Program for
Microcomputers) and MS-DOS (which stands for Microsoft Disk Oper¬
ating System), Larger computers use other operating systems. Prime
computers, for example, use one called Primes (“os” is often used as an
abbreviation for “operating system”). On a VAX, the operating system
is most likely to be VMS, On DEC-10s and DEC-2 Os, an operating
system called TOPS-20 is often used.
All of these operating systems function in different ways, but
regardless of the computer they run on, their job is the same: They are
responsible for telling the computer what to do when it first comes to
life and for making it able to run other programs.
How They The most basic part of an operating system is always in the computer
Are Used in special memory that isn’t erased even when the power is turned off.
This basic part usually initializes the computer’s memory and tells the
computer how to get the main operating system, which it does by
loading the program, usually from disk, into main memory. Once the
operating system is loaded, the computer is capable of receiving, dis¬
playing, storing, retrieving, and transmitting information, and of per¬
forming the calculations that a computer is expected to perform.
When the operating system is ready to get to work, it gives the
user a prompt , a visual signal that tells the person it is waiting for input
from the keyboard. On a microcomputer, the first input is usually a
command of some sort that tells the computer what to do next. On
large time-sharing systems, the first keystrokes are usually the user’s
account name and private password, which tell the computer who is
loggmg on and give the system a chance to verify the person’s right to
use computer time. (This is the first level of computer security, by the
way, and hackers are often required to breach this security in order to
use the computer,)
The prompt itself can be any symbol that the system program¬
mer cares to choose, as long as it can be displayed on a video screen.
Most prompts are either one or two characters long. Some include
some type of information, such as the time or date, or an indication of
what part of the computer the user is connected to at the moment. But
42
CHAPTER IHREE 4 look at (omputert
usually, prompts are short and sweet, like the famous A> often used
on microcomputers.
Regardless of the type of prompt, once the initial command or
log-on sequence is accepted by the operating system, the computer is
at the disposal of the user. The operating system “knows” that some¬
one wants to do something, and as long as that something is within its
or another program’s abilities, the operating system continues to pay
attention to the keyboard, translating each line of text that the user
enters into numeric codes that the computer can understand. This is
the reason why we can type in words that almost seem like normal
English - words like ERASE FILE or COPY FILE - instead of a seem¬
ingly endless string of random-looking numbers.
Because of the jobs it does and the equipment it controls, the op¬
erating system is at the core of any computer’s ability to do anything.
Complex, coldly logical, and endlessly fascinating to a hacker, the op¬
erating system is the link between user and computer. It is also where
many major security procedures are implemented - or thwarted.
Like people, computers often speak different “dialects.” Unlike peo¬
ple, however, they cannot communicate unless they use exactly the
same “words.” By all this, I’m not referring to programming lan¬
guages, such as BASIC or COBOL. I mean something a lot more funda¬
mental: the coding that is used to represent words, numbers, commas,
quote marks, and every other piece of information that computers of
any size must handle.
That coding, or common language, is known as ASCII (short for
American Standard Code for Information Interchange). ASCII is sim¬
ply an agreed-upon system for converting computer data into 128
alphabetic and numeric characters, as well as punctuation marks and
mathematical symbols. This system allows information to be sent to
and from totally incompatible computer systems. Just over 90 of these
characters are visible; the others are known as control characters —in
other words, characters, such as those representing “carriage return”
or “tab,” that normally don’t appear on the screen but are supposed to
“control” a computer.
HOW
COMPUTERS
COMMUNICATE
43
OUT OF I H E I N N E fi CIRCLE
Technical as it may sound, ASCII is really very simple. It assigns a
specific number to each of the 128 characters it recognizes as valid.
For example, the ASCII code number for the capital letter A is 65; for a
period, it is 46, and for a lowercase a, it is 97. The transmitting coni'
puter simply translates everything it is sending into this ASCII code,
and as long as the receiving computer can “understand” ASCII, and no
non-ASCII characters are included, everything is OK. Communication
is assured and, using ASCII as a common language, the computers can
send and receive information at very fast speeds.
0 and 1, the Now that we have computers speaking a common language - the lan-
Magic Numbers guage of numbers — the next step is to find out how they “think” of
these numbers.
Every computer in the world, from the giants that send space¬
ships to the moon to the smallest game-playing home computer, shares
a common denominator, a universal currency, the numbers 0 and 1.
These two numbers are the famous bits, or binary digits. They are the
oniy two digits used in the binary, or base-2, number system, just as
0 through 9 are the only ten digits in our familiar base-10 decimal
system. Zero and one are very comfortable for computers to work
with, because they can represent the two electrical states used by the
machines-high and low voltage. And between them, the two binary
digits can be combined in longer and longer groups to represent any
conceivable number.
Computer people don’t usually work with bits, though; they are
too small. Instead, the most commonly used unit is a group of eight
bits, called a byte, and is approximately the amount of information
storage needed to specify one alphanumeric or control character.
Larger groups of bytes are kilobytes (KB), or roughly one thousand
bytes, and megabytes (MB), or about one million bytes. But all of these
groupings still are multiples of 2, the binary digits 0 and 1.
If you own or use a microcomputer (or personal computer), you
know about your computer’s amount of RAM, or random access mem¬
ory, and its disk-storage capacity - its ability to store information on
either floppy or hard disks. On these computers, memory is measured
in kilobytes, and disk storage is measured in kilobytes or megabytes.
44
CHAPTER THREE i Look at Computers
Bits, bytes, kilobytes, or megabytes — in the end they all repre¬
sent the same thing: numbers. Numbers that connect telephones, give
orders to computers, record financial transactions, track rockets to
the moon, and monitor nuclear missiles. All numbers, just numbers.
When you say that computers process information, you are also saying
that computers store and retrieve, add and subtract, send and receive
various collections of numbers, all of which are stored as binary num¬
bers and all of which are kept and made accessible as data files.
By using ASCII as a common language, computers can send and re¬
ceive information at very fast speeds. When they communicate over a
phone line, however, they must use modems and they must slow down
considerably to allow for several intermediary steps. Instead of using
a cable for direct computer-to-computer transmission, they must use a
computer-to-modem-to-phone-to-modem-to-computer hookup. This
communications relay is still much faster than many other communi¬
cations technology now widely available, however, and in terms of
spoken words, it can still be pretty fast.
In their work as “translators,” modems do two things: Modulate and
DEModulate - that’s how they got their name. Essentially what hap¬
pens is that the sending computer’s modem converts the information
into a series of sound impulses that are able to travel over a telephone
wire; this is the modulation process. On the other end, the receiving
computer’s modem translates the sounds back into the binary data
that the computer can understand; this is the demodulation process.
The speed at which computers and modems send and receive
data is measured in baud, or bits per second. Most modems cannot
communicate over the phone lines at more than 1200 baud, and quite a
few cannot handle any more than 300 baud. At 300 baud, information
is moving to or from a computer at the rate of about 30 characters per
second; at 1200 baud, it is moving about four times as fast. In contrast,
when computers are connected directly, they usually transmit data at
4800, 9600, or 19200 baud when using ASCII, At 19200 baud, infor¬
mation is moving at just about 20,000 characters per second.
COMMUNI¬
CATIONS
TECHNOLOGY
Modems
45
OUT OF THE INNER ( I R C 1 E
Terminals
NETWORKS
A terminal is a piece of equipment used for communicating with a
computer. A terminal can either be connected directly to a computer
by a cable or, if the terminal is equipped with a modem, it can be
anywhere in the world. In addition, a terminal can be either “smart”
or “dumb.” A smart terminal has a microprocessor and is thus capable
of independent “thought,” whereas a dumb terminal has no micro¬
processor and is simply a device for sending and receiving informa¬
tion. Now, to make life a little more complicated, there’s one more
either/or: A terminal, smart or dumb, either may or may not be associ¬
ated with a modem. Let’s clarify matters with a few examples:
A dumb terminal with no modem is a sending and receiving
device only and must be connected (“hard-wired”) to a computer by
means of a cable.
A dumb terminal with a modem is still a sending and receiving
device, but it can be anywhere, because the modem enables it to use a
telephone to access the computer. A dumb terminal with a modem is
the device I used in my first attempts at hacking.
A smart terminal with no modem is capable of communicating
with a computer, as long as it is connected to the larger machine by a
cable, and it is capable of processing information on its own. It is often
a microcomputer.
A smart terminal with a modem is capable of communicating
with a computer from any location that gives it access to the telephone
system and, again, it is capable of processing information on its own. A
microcomputer equipped with a modem can a/so be considered to be
a smart terminal.
When a computer allows a terminal to access it from a remote
location, it treats that remote terminal just as if there were a cable
connecting them directly, in the same room. As long as the remote
terminal is connected to a communications port, or channel, through
which information can enter and leave the system, the computer nei¬
ther knows nor cares where the terminal is physically located.
When several computers are connected to one another via permanent
long-distance communication links, they are parts of a network. The
46
CHAPTER THREE A Look at Computers
first computer network, and one that is still explored today by many
hackers, is called ARPANET and was created in the late 1960s by
researchers working on projects for the U.S. Defense Department.
ARPANET was a boon to these researchers, because it enabled them
to communicate and share information, even though they and their
computers were located many thousands of miles apart.
In the 70s and ’80s, the ideas that were first developed by the
Defense Department began to be applied to commercial networks in
which business or research computers used the same kind of tech¬
nology used in ARPANET. With the growing use of both large and
small computers, and the need for people other than computer special¬
ists to make use of computer resources from remote locations, public-
network technology {and the public-network business) developed very
rapidly. Today, it’s probably safe to say that more than 100,000 large
computers are connected to telephone lines.
A public network, like the one in the diagram, can be defined as
an alternate route for your telecommunications data. The company
that owns the network has modems in certain cities that it selects for
local access to the network. Then, the network company routes your
47
OUT OF I H £ INNER CIRCLE
THE HUMAN
NETWORK
The Beginnings of
Computer Security
call through its own long-distance service, so that you end up within a
local distance of the computer you are calling. The phone system itself
is actually used only for local calls, so the result is that if, for example,
you live in Indianapolis, you can call a network computer in Boston
without having to make a direct, long-distance phone connection.
So far, we’ve covered a great deal about machines and operating sys¬
tems. Now we can put them in perspective by seeing how they are re¬
lated to the people who use and run them: Let’s take a look at the
human side of the connection.
Computer security is based on the idea that certain information
stored in the computer should be made available only to people with a
“need to know,” and that measures must be taken to prevent unautho¬
rized people from using information that they either cannot, for tech¬
nical reasons, or should not, for other reasons, have access to.
There was a time in the history of computers when there was no
such custom of preventing particular users from using particular files.
The practice started with the appearance of the first time-sharing
computers. Before time-sharing, computers were capable of running
only one program at a time, so only one person could use the computer
at any one time.
When time-sharing programs made it possible for many people to run
many programs at the same time, the operati ng system suddenly had
to keep track of many more people. To make this informational house¬
keeping easier to do, the operators of those systems assigned each user
a unique user name that identified him or her to the computer. When
people wanted to use the computer, they would log on by entering
their user names; in this way the system was able to tell the difference
between one user and another. When people had finished using the
computer, they would log off to tell the computer they were done, and
make room for another user to log on in their place.
This system worked well, but it quickly became necessary to
make sure that one user could not modify or erase the files belonging
to another user, so the people who designed these first time-sharing
systems put a program into the operating system that would allow
48
CHAPIER THREI 4 look at Computer*
users to change or delete only their own files. In effect, this program
turned the computer from a kind of open file cabinet into one with
more restricted access. Private passwords were born, both to protect
people’s files and, because computers were still pretty expensive ma¬
chines to run, to keep people from using each other’s computer time.
In order to use a time-sharing computer, people now logged on
by entering both a correct account name and a correct account pass¬
word. The account/password security device became the main se¬
curity feature of most time-sharing systems, and it is still widely used
today. Few, if any, time-sharing systems work differently. Some sys¬
tems add additional security measures to the account/password
method but, so far, no new methods have replaced the tried-and-true
account/password combination.
Regulating access to accounts was the first, but not the only, level of se¬
curity that was created with the first time-sharing systems. The ad¬
ministrators of those early systems were also concerned about the
amount of power given to each account. Power in this sense is the abil¬
ity to manipulate other files.
When the first account names and passwords were created, new
programs were also created to exercise control over the files in the
system. These were programs that could tell the system to accept new
users, deny access to old users, erase files, reset passwords, and take
care of other such “supervisory” chores. Naturally, these new pro¬
grams also opened the door to potential chaos if everyone could use
them, so these program files were kept away from the users and re¬
served for the system operators who were responsible for overseeing
the entire system.
Eventually, the allocation of power over computer files led to the
development of a user hierarchy that is still in existence today. This
hierarchy is based on the fact that a wide range of people with a wide
range of computer-related abilities may all need access to the re¬
sources of a single large computer. For example, programmers know
more about computers than people who use these machines only as
word processors, so programmers need more power to manipulate
certain files. Similarly, system accountants need access to files that
Levels of
Security
49
OUT OF I H l INNER CIRCLE
programmers have no need to see or change. And over all these oth¬
ers, there is the system operator who has the power to run the entire
system. This is the hierarchy that hackers seek to climb whenever they
begin to explore a new computer.
The System Although the story of A1 and George, the MegaCar system operators,
Operator and the discussion of computer security in this chapter may have led
you to believe that system operators, or sysops, must be enormously
powerful creatures sitting alone at the top of the computer hierarchy,
you would be giving them both too much and too little credit by think¬
ing of them in such terms.
The job of “system operator” is less easy to define than, say, the
job of “doctor” or “plumber.” These latter professions imply a certain
amount of specific education and training. A system operator, on the
other hand, can be anyone from a person who has worked with com¬
puters for twenty years but doesn’t necessarily know a great deal
about them, to someone with a 4.0 average and a degree in computer
science from MIT. A system operator may teach computer science at
MIT, or be a high-school student working during the summer.
For the most part, though, system operators do know quite a bit
about computers, and for one main reason: Very few people apply for
the job, and a large number of those who do apply, especially in a
university environment, have already been involved with computers
for awhile. Many of these people see the job as a great opportunity to
play with multimillion dollar equipment - legally,
A system operator is often called an “operator” and, in fact, per¬
forms a job similar to that of a telephone operator. A system operator
takes care of the system and, if a user needs to do something special or
has a problem, the operator has the power to override the system’s se¬
curity to help out — just as a telephone operator can credit your ac¬
count if you call a wrong number. Most of the system operator’s tasks
are very ordinary, such as changing a disk or moving a reel of tape.
And, usually, a system operator sits around the computer room drink¬
ing coffee and doing crossword puzzles. Then again, he may sit around
reading computer books or he may even play with the system. It all de¬
pends on who he is, and where he works.
50
CHAPTER THREE A lock si Computers
Regardless of his background, however, as you can see, a system
operator’s need of power is not the need for some godlike ability to
give and to take away. The power is much closer to a hacker’s interests,
because it is the power to control a computer.
A hacker is someone who wants to know anything and everything
about computer systems. In order to gain that knowledge, he must be
able to climb the user pyramid. This is how it often happens:
In an institution such as a large business or a university, there is
a large community of computer users, many of whom use only the
word-processing, file-storage, or communication capabilities provided
by the system. They know little about the complexities of the system
itself, unless they happen to be interested for other reasons. These
people are the users who are at the bottom of the computer hierarchy.
Some users are programmers who know the computer’s own
language, so they know more about the computer than the people on
the bottom level. Moving higher up the hierarchy, there are some pro¬
grammers, called system programmers, who know more than other
programmers because they know how the computer’s operating sys¬
tem works. And, because there is usually a need to regulate how much
power the different users are given, there is almost always a system
operator at the top.
On most computer systems, there is a list of anywhere from
seven to a hundred “rights” that an account on the system can have.
Obviously, the more and better rights an account has, the more power¬
ful it is. The system operator has all of these rights, whereas a typical
user may have only one or two. When a hacker manages to secure an
account on a new system and asks for information that he would find
useful or interesting, the computer responds with INSUFFICIENT
PRIVILEGE if the information requested is not within the rights of
that account Such a response is guaranteed to challenge a high-level
hacker, because he has probably started off with a very low-level
account-possibly even lower than the ones given to typical users.
From then on, the hacker will try to gain more power on the sys¬
tem, either by granting more rights to his account or, more likely, by
gaining other accounts that already have more rights. In the first
5!
Where Hackers
Fit in
OUT OF THE INNER CIRCLE
HELP IS
WHERE YOU
FIND IT
instance, the hacker will almost always have to trick either the system
operator or the system itself into giving more rights to an existing
account. If, on the other hand, he decides to go after accounts owned
by other people, he can try to trick the system, the operator, or the
user. As you will see in later chapters, there are many ways a hacker
goes about hacking. But if, as was true of the Inner Circle, he seeks
knowledge about the system and wants to gain more and better ways
of exploring the computer, the hacker’s goal is an account with as
much power as that of the system operator.
Now that we’ve looked at computers, computer security, and com¬
puter use in general, it might be a good idea to take a look at a specific
computer and see how it can be used.
Up until now, perhaps you have thought that computers always
talked in strange languages or used pulsing lights or long strings of
numbers. On a very simple level, all computers do, indeed, operate in
a fashion similar to that. On the level at which computers interact with
most people, however, computers are quite simple to deal with.
Take this next example, for instance. Let’s assume that you and I
are just learning about computers and have no idea how to work with
them. We are learning, not on a microcomputer, as most people do, but
on a superminicomputer, a VAX, that typically would cost over half a
million dollars and be used by a medium-sized or large company. We
log on (the authorized way) by typing in an account name and pass¬
word. Here is what we see:
I
Hmm. Not much there, so when in doubt, ask for help!
Vtfe try asking for help ....
$ help
The system quickly responds....
Information available:
ACCOUNTING ALLOCATE
APPEND ASSIGN
BACKUP BASIC
ANALYZE
ATTACH
BLISS
52
CHAPTER T If ft E E A took of Computers
CANCEL
COBOL
COPY
DBO
DEASSIGN
DEFINE
DIFFERENCES
DUMP
EOJ
EXIT
GOTO
INITIALIZE
Lexical
Login
MAIL
MESSAGE
ON
PASSWORD
PLI
PURGE
RENAME
RMS
RUNOFF
SHOW
Specify
SPSSX
SUBMIT
System
TSP
WAIT
CC
CONTINUE
CORAL
DDL
DEBUG
DELETE
DIRECTORY
EDIT
Errors
FDL
HELP
INQUIRE
LIBRARY
LOGOUT
MCR
MONITOR
OPEN
PATCH
PRINT
Queues
REPLY
RTL
SEARCH
SORT
SPSS
START
Symbol-Assign
TECO
TYPE
WRITE
CLOSE
CONVERT
CREATE
DEALLOCATE
DECK
DEPOSIT
DISMOUNT
EOD
EXAMINE
FORTRAN
IF
JOB
LINK
MACRO
MERGE
MOUNT
PASCAL
PHONE
Procedure
READ
REQUEST
RUN
SRT
SPAWN
SPSS-X
STOP
SYNCHRONIZE
TIME
UNLOCK
Hmm .., let s see ... well , we have heard of BASIC before —
it’s supposed to be pretty simple....
Topic? basic
BASIC
Invokes the VAX-11 BASIC compiler,,..
Format:
BASIC [source-file [,...]]
If you supply one or more file specifications, BASIC compiles the
source filc(s). If you do not supply a file specification, you enter
the BASIC environment and receive the Ready prompt.
If you separate source file specifications with commas, BASIC
compiles each module separately and produces multiple object
53
OUT Of THE INNER CIRCLE
files. If you separate source file specifications with plus signs
{ + ), BASIC appends the files and produces a single object file.
Additional information available:
Qualifiers
/ANSI_STA N DARD
/CROSS
/DOUBLE
/LINES
/OBJECT
/SCALE
/SYNTA3CXHECK
/WARNING
/AUDIT
/DEBUG
/FLAG
/LIST
/REAL_SIZE
/SHOW
/T Y PE_ DEFAU LT
/ WORD
/CHECK
/DECJMAL_SIZE
/INTEGER_SIZE
/MACHINE
/ROUND
/SINGLE
/VARIANT
RELEASE_NOTES
That looks complicated so let's go to BASIC firsthand _
BASIC Subtopic? < return>
Topic? < return>
$ basic
VAXT1 BASIC V2.2
Ready
Hmm ... not much to do but ask for help again —
help
HELP
The HELP command displays on-line information about BASIC
statements, commands, directives, functions, conventions, and
other topics. Type HELP to see a list of topics. Then enter a
subtopic for more information. If you type a question mark in
response to the prompt for a topic, BASIC displays the list of
available topics.
Additional information available:
ARRAYS
COMMENTS
DATA_TYPES
EXPRESSIONS
IMMEDIATE
MODIFIERS
STATEMENTS
CHARACTER
CONSTANTS
DIRECTIVES
FUNCTIONS
LABELS
QUALIFIERS
VARIABLES
COMMANDS
CONVENTIONS
ERRORS
HELP
LINE
RELEASE_NOTES
Topic? stat
54
CHAPTER THREE i Look of Computers
The whole word need not be entered _
STATEMENTS
Statements assign values, perform I/O, transfer program control,
and so forth. Program statements are associated with a line num¬
ber and stored for later execution* A statement starting in the
first column and having no line number is executed as an imme¬
diate mode statement* For additional information on immediate
mode statements, type “HELP IMMEDIATE”,
Statement modifiers are keywords that qualify or restrict a state¬
ment, For help on modifiers, type “HELP MODIFIERS”,
Additional information available:
CALL
CHAIN
CHANGE
CLOSE
COMMON
DATA
DECLARE
DEE
DELETE
DIMENSION
END
EXIT
EXTERNAL
FIND
ENEND
FNEXIT
FOR
FREE
FUNCTION
FUNCTIONEND
FU NCTION EX IT
GET
GOSUB
GOTO
IF
INPUT
ITERATE
KILL
LET
LINPUT
LSET
MAP
MARGIN
MAT
MOVE
NAME. AS
NEXT
NOMARGIN
ON
OPEN
OPTION
PRINT
PUT
RANDOMIZE
READ
RECORD
REM
REMAP
RESTORE
RESUME
RETURN
RSET
SCRATCH
SELECT
SLEEP
STOP
SUB
SUBEND
SUBEXIT
UNLESS
UNLOCK
UNTIL
UPDATE
WAIT
WHILE
A lot of statements ... let's see what it says about GOTO ... *
STATEMENTS Subtopic? goto
STATEMENTS
GOTO
The GOTO statement transfers control to a specified line
number or label.
55
OUT OF THE INNER CIRCLE
Format
{ GO TO}
{ GOTO} target
Example.
20 GOTO 200
STATEMENTS Subtopic? <return>
Topic? <return>
Ready
And here we are again....
The point of this example is to show that a typical expensive
piece of computer equipment is not as difficult to operate as most peo¬
ple would think. Most systems in operation today make it possible for
you to ask for help from just about any possible place. You can ask
about a language, about the mass storage, in some cases about phone
numbers to other computers....
CHAPTER FOUR
Who Hacks and Why
I
fs Sunday night, and Fm in my room, deep into a hack. My eyes
are on the monitor, and my hands are on the keyboard, but my mind
is really on the operating system of a superminicomputer a thousand
miles away - a supermini with an operating system that does a good
job of tracking users, and that will show my activities in its user logs,
unless I can outwit it in the few hours before the Monday-morning
staff arrives for work.
The only light in the room comes from the green screen of my
computer monitor and the small red lights on my modem. I turn and
check the dock: 3:00 a + m. “Good,” I think. “Three hours before I have
to leave for school. Too bad I didn’t have time to do any homework.”
Thoughts of school evaporate, and 1 return to my computer with the
enthusiasm of a Super Bowl football player.
Eighteen hours ago, I managed to hack a password for this PDF
11/44. Now, I have only an hour or so left to alter the user logs. If I
don't, the logs will lead the system operators to my secret account, and
57
OUT OF THE INNER CIRCLE
UNDER¬
STANDING
HACKERS
the hours of work it took me to get this account will be wasted. I’ve got
to cover my tracks; I can only hope the company doesn’t use printed
copies of the logs. Those I can’t change.
An hour passes and 1 begin to fear the worst... if only I had more
time. But 1 realize that I’d best say goodbye to my account as I watch
the first couple of users log on: ACCT004 - that one’s all right, it’s a
low-levei user’s account. SYSOl-hmm ... that’s the sysop. The game’s
over, and I’ve only changed the log for one of the twenty-four accounts
I looked into. I’d better stay home today and use my secret account
until the system operators find me and remove it. I wonder how long it
will take them to figure out that I’m here.
Very few people, from the designers and operators of large systems to
the investigators and law-enforcement officers who deal with hackers,
understand what hackers are trying to do, much less why they’re try¬
ing to do it. During my own trial, for example, the judge decided to
postpone sentence until after I had undergone psychiatric evaluation.
What makes hackers hack? Why are they so dedicated? Why do
they spend so much of their own time on other people’s computer sys¬
tems? And just what do they think they are trying to accomplish? It
is not rare for a hacker to put in a sixty- or seventy-hour work week
(without getting paid, of course). And these are not empty hours, filled
by staring out the window. Hacking is a challenge and a game of wits,
and during their work sessions, hackers are using all the skills and
ingenuity they have developed. Hackers enjoy what thev do.
Suppose your business or research computer system is the object
of such a hacker’s “affection.” Obviously, you will be faced with a lot of
dedicated, not to mention clandestine, effort. Depending on the kind
of hacker who finds your system, you could also be faced with the po¬
tential for abuse and destruction of your programs and data.
Before you can find the right security countermeasures for your
own computer system, you need to understand who your opponents
are, and why they are testing your defenses. I am not qualified to dis¬
cuss hackers in philosophical or psychological terms, but 1 can give you
some practical answers to what is ultimately a practical problem: I can
SB
CHAPTER FOUR Who Hacks and Why
introduce you to hackers in general, and to several very different
types of hackers I know about. Once you understand why these differ¬
ent types of hackers hack, it should be easier for you to recognize the
different dangers they pose to unprotected or inadequately secured
computer systems.
A better understanding of hackers will help you immeasurably
on this ever-changing battlefield, because hackers will always be hack¬
ers. They’ll always be probing your security, and for the same reasons
they do so today. Even if hackers’ techniques evolve far beyond their
present tricks, or their personal equipment eventually dwarfs the ca¬
pabilities of a multimillion-dollar IBM-370 mainframe, the person you
will have to discover, identify, and handle in some way will be just like
the hacker who may be on your system today.
From my years as a hacker, and from my years of communicating with
other hackers, 1 think 1 can safely say that a typical hacker is in his
teens or early twenties, and almost always someone whom people
would call a “fast learner.” He is either at a very advanced academic
level, in a “gifted” program in school, moving at his own pace (in
which case he doesn’t really have the time to be a good hacker), or he
is bored with school.
The teachers of hackers who are bored students might argue
with my characterization of them as extremely fast learners. On the
other hand, there was a time, not very long ago, during which about
one percent of the U.S. population had computers; ninety-nine percent
(or thereabouts) of hackers came from that time. Now, when there are
millions of Apples, IBM PCs, Commodore 64s, and so forth, compara¬
tively few new hackers are emerging. Aside from the obvious reasons,
such as better mainframe security and more microcomputer software
to choose from, I believe hackers are more motivated than most peo¬
ple, and that it is probably just this motivation that helps make anyone
“bright,” at least in his or her own field.
Just watch a high-level hacker at work on a subject that truly at¬
tracts his interest, and you’ll see what he can do when he puts his mind
to it. That subject — really a state of mind more than anything else - is
HACKER
PROFILES
59
OUT OF THE INNER CIRCLE
hacking. A hacker can hack a minicomputer, a supermini, or a main¬
frame with anything from a $150 dumb terminal to a £7000 IBM per¬
sonal computer system. (In most cases, the “smarter,” more expensive
system is just easier and more convenient to work with; it doesn’t nec¬
essarily make hacking the target computer very much easier.)
I’ve also noticed that many hackers, when they “grow up,” choose
to work with computers as a profession, and usually turn out to be far
more dedicated and knowledgeable than their non-hacker colleagues.
This dedication is easy to understand once you realize that a universal
trait among hackers is pride in the amount and quality of their knowl¬
edge-pride that, often enough, verges on arrogance. After all, if you
have figured out how to crack a very difficult system, it is part of your
nature as a good programmer to want to see if your method works.
This is the reason that a large percentage of system operators have
dabbled in hacking at one time or another. While hacking, I’ve talked
to hundreds of system operators, and I’d estimate that probably sev¬
enty to eighty percent of them claim to have been hackers at some
point in their lives. They love talking about such matters.
There is another important trait that is common to hackers: They
all share an intense, compelling interest in computers. This common
ground is the basis for the few unwritten rules that 1 mentioned in
Chapter One: Never delete or alter information you cannot easily re¬
store; never leave your (or any other hacker’s) name on a computer; al¬
ways try to obtain your own account information and do not exist as a
parasite on the findings of other hackers.
Most hackers follow these rules most of the time, because:
= They would like to keep the account information they went to so
much trouble to get.
= They would like to stay out of legal trouble, if possible.
= They like computers and don’t have any reason to cause trouble
to them or for the people who rim them.
= They love the elaborate, complex logic of computer systems.
People who find pleasure in destroying data are not motivated
by love of the system or by respect for other hackers.
60
CHAPTER FOUR Who Hicks ind Why
With this general information in mind, let’s move on and take a
closer look at each of five different types of hacker: the Novice, the
Student, the Tourist, the Crasher, and the Thief.
Frequent references to the movie WarGcunes, mixed in with a few
phrases like “Got any awesome numbers?" typify the Novice. These
hackers are younger than most - maybe twelve to fourteen - so they
often live off throw-away accounts from the more advanced Students
I’ll describe next. I would imagine that Novices think of hacking as
play, or mischief-making, and not much more than that. Of all the
different groups I’ll describe, they are the ones most likely to be drawn
by the image of hacking as a fun and somewhat “naughty” pursuit. I’m
sure they enjoy playing with computers, but to them, hacking is play. It
isn’t (and maybe never will be) programming, assembly language, and
operating systems.
Novices are very unpredictable, because of their inexperience,
and their population is rapidly growing, because of recent glamorous
publicity, but for the most part they are “safe” in terms of reasonably
secure computer systems. Assuming that Novices can get onto a sys¬
tem in the first place, they will usually just log on, type PLAY GAMES,
WITHDRAW $20,000, and CATALOG or DIR (to see what sorts of file
names the computer will display). Then they will most likely get bored
and go off to play Super-Invaders or do their homework.
When caught and confronted by a system operator - or another
hacker—a Novice will almost always announce himself quite clearly.
I know of one Novice who was detected by the Inner Circle while
they were on a Prime computer. The unknown hacker was using an
account belonging to a former employee, someone who had not had
access to the Prime for several months, so the Inner Circle members
were certain there was another hacker on the system. To find out who
he was, and to test his capability, they used one of the operating sys¬
tem’s special programs, one that allows two users to type messages to
one another, to “break in" and send a specially worded message to the
new hacker: MARC, IS THAT YOU? An experienced hacker would
have sent them some ambiguous reply or tried to hide his identity in
some way. Instead, they received: 1 AM NOT MARC. PM A HACKER
The Novice
it
OUT OF THE INNER CIRCLE
The Student
H AHA HA! I’LL INITIALIZE YOUR HARD DRIVE IF YOU DON’T
TAKE OFF!!!! They had contacted a Novice.
I considered myself a Student, and if someone had asked me why I was
hacking, this is what I would have said:
“I come home after a typical day in school, wishing they would
actually teach me something - get me interested. I throw my home¬
work on the floor, flip on my terminal, and go over the list of accounts
I’ve acquired. I have access to any of a dozen or so systems ranging
from two-hundred-thousand-dollar college computers to multibillion-
dollar corporate systems. I decide I’ll start the day out with a DEC-10
in Nebraska... it has four or five games on it I like to play.
“If I decide I can stop work long enough to attend school, at best I
am disappointed by the amount and level of anything I learn during
those ‘wasted’ hours. More likely, though, I will complain about the
repetition of it all: ‘You told us that yesterday,’ ‘This is just useless re¬
view,’ or ‘Let’s get on with it already!’
“After getting an account on a new system, I will spend as many
hours as possible on that system - twenty or twenty-four hours at a
time on one account, if the system is something that I haven’t seen be¬
fore, or if it has programs or text on it that interest me. I need to learn
as much as I possibly can: not only everything about the computer it¬
self, but everything about the data, too. Computers are convenient,
and they interest me to begin with, but once I am on your system, I’ll
be quite content to learn about your company’s management struc¬
ture -if that’s all there is available.”
Students are bright, and they are bored. They are smart enough
to know they have a lot to learn, and what interests them most is what
they can find out next. As the name implies, this is a stage from which
one can only graduate by finding out how to graduate.
For me, and most of my friends, the excitement comes in learn¬
ing something I did not know a moment before. I love to know more
than I did a few minutes ago, as 1 think most people do.
Imagine yourself in a huge library. As far as you can see, informa¬
tion that interests you is lying about. When you are on a system, it
feels as if you are following the stacks, until you come to something
62
t H 4 P 1 E S FOUR Who Hacks and Why
you don’t know and would like to learn. You spend several hours
learning it. There is a possibility that you will not understand it, but
that is not a problem - in fact, when you come back to it in a few days
and do understand it, you feel as if you have learned that much more.
By the end of a typical day, a Student may have visited several
computer systems, whose total hardware value could be in the tens of
millions of dollars, and he may feel that he has learned twice as much
in one day as he has during the entire school year.
Hacking is basically a solitary pastime, especially for Students,
who like working on their own. But hackers are no more or less anti¬
social than the rest of the world and, like anyone else, they enjoy
“bumping into” acquaintances. During a trip around his various ac¬
counts, a Student may, for instance, run into a friend from Florida
while exploring a DEC-20 in New York. The “meeting” would look
something like the following exchange.
Other Hacker: Scan? Is that you?
Student; Who’s this?
Other Hacker: This is Sentinel from Florida.
Student: Hi. How did you find me?
Other Hacker: You have NAME set to HACKER_SCAN.
I thought it sounded like you. I have an operator account for
an HP-3000. Want it?
Student: I forgot that I set my name. Operator account? Sure.
Other Hacker: It’s that 3000 we had a few months ago. The
account is OPERATOR.SYS LOVE.
Student: Thanks. Let’s see ... I can give you a new Cyber
account I have: 705-55 5-32 4 2 4334, SEC RET. You know
how to use a Cyber, right?
Other Hacker: I won’t even answer that one. Got to go... bye.
Student: Bye. See you around.
Here’s what happened during this conversation: The Sentinel
(who lives in Florida) and Scan were both on the same computer. The
Sentinel had checked out other users by running a program that listed
who was currently on the system, and he had noticed the user name
HACKER_SCAN. Thinking he might know this person, The Sentinel
63
DUt OF THE INNER CIRCLE
The Tourist
risked “talking” to him. Once they had established who they were,
The Sentinel offered Scan access to a very powerful operator’s account
on an HP-3000 computer. This offer was accepted, and Scan returned
the. favor by giving away his new account on a Cyber computer.
If you discover a Student on your system, consider yourself lucky
in two aspects: lucky that he’s a Student and not a destructive hacker,
and lucky that you found him at all. A Student would never intention¬
ally damage a system, because there’s no reason why he should and
there are many good reasons why he shouldn’t. He spent as much as
twenty to forty hours just to get access to the system, and he wants to
remain undiscovered, if at all possible, so he can keep using the com¬
puter. He also wants to stay out of any and all trouble. He spends long
hours in cracking a system, so he respects the work of the system’s
programmers and wants to avoid giving them extra work. Besides, he
knows that he may someday want to apply for a job with your com¬
pany or perhaps request an account as a favor (it’s very nice to get
official use of a computer system).
However, assuming the Student has enough time, he will, out of
curiosity, sooner or later examine every file on your system, and for
some companies this prospect can be dangerous in its own right. I have
never known a Student to abuse information he found, but then if you
have the log-on procedures to your high-security computer stored as a
file on your low-security computer, the potential for abuse - if not by
the Student, then by someone less “ethical”-certainly does exist.
And one final note: A Student often roams undiscovered on your
system until he walks in looking for a job. When you see his resume,
you will find that he’s had three years’ experience on the same com¬
puter you have, doing the same type of programming you need done.
Strange, but somehow Students seem to know just the person you
want to hire ... and when.
Unlike the Student, the Tourist is out for nothing more than an adven¬
ture or the challenge of solving a puzzle. Quite often he obtains an ac¬
count, simply looks around for a few minutes, and leaves, never to
return again, Why would someone spend so much time doing some¬
thing without reward? For the Tourist, hacking is a form of mental
64
C H » P T f fl FOUR Who Hocks and Why
game, like a crossword puzzle. His reward is the “thrill of victory” he
feels after succeeding in his quest. This is how a Tourist once described
his hacking to me.
“You have to decide in advance what system you are going to get
into. It’s always best if you just pull a name of a large company or cor¬
poration out of the phone book at random; that way, you can succeed
on two levels. When you discover how to call into a computer you
weren't quite sure existed the day before, that’s a small victory in it¬
self. Then, after you have decided to try getting into the computer, you
start to draw up a game plan. In many cases, you can succeed simply
by calling the company and convincing some secretary to give you an
account but, in most cases, you simply get a user name from the com¬
pany and get to work on hacking the password.
“It’s usually very simple to tell what kind of password will most
likely be in heavy use. In almost every case, at least two to three per¬
cent of the passwords on a given system will be first names - possibly
as many as twenty percent. Quite often ten or twelve percent of the
passwords will be single character. After you have a user name, you
can start hacking_
“It’s got to be done a hundred percent by hand, because it isn’t
even worth it to set up your computer to try a hundred thousand
different passwords. The main problems with using the computer [to
search for valid passwords] are that it isn’t nearly as much fun if you do
succeed, and the computer has no ‘feel’ for trying passwords in differ¬
ent situations. Secondary problems include the fact that it gets hard to
trust a computer if it reports NO SUCCESS after ten or fifteen hours.
“Anyway, after you’ve got your account name and password, you
just log on to make sure that the computer is nothing special... like a
top-secret military computer or an FBI training computer. If it isn’t,
then you write all the information down and save it for possible later
use. If you do ever use the account again, it will most likely be to trade
information with other hackers. Getting in with a traded name and
password isn’t nearly as gratifying as getting in yourself, but it’s still
fun to look at what other people are doing.”
You can see that the Tourist is a person who needs a good puzzle
from time to time. I think there are two characteristics that a hacker
65
OUT D f THE INKER CIRCLE
The Crasher
needs in order to be a Tourist. First, he needs to be someone who feels
that he has to test himself. Second, I think he needs a very mathe¬
matical mind because he is always figuring the odds: K Suppose I spend
thirty hours on this system. With the information [ now have, will
cracking the system be worth the time?” “How likely is it that I'll get in
with this or that method?”
Every now and then a Student or a Crasher (whom Ill describe
next) will contact a Tourist and ask him to get a password to a particu¬
lar system. When the Tourist decides to try such jobs, he succeeds
probably eight or nine times out of ten but it may take him as long as
a year. A Tourist is a fairly safe type of hacker, because he has no inter¬
est in being destructive. There is a fairly strong possibility, however,
that the Tourist will trade the password to your system off to a more
destructive friend at some point, because using the system is not as im¬
portant to him as it is to a Student Getting in is the name of his game.
You won't know you have a Crasher on your system until it's too late:
until you hear from an irate user that three weeks' work has been de¬
stroyed and you find the words THE MAD CRASHER STRIKES filling
all two and a half billion characters of your disk space.
The Crasher seems to operate with little or no logical purpose.
He is a troublemaker, motivated by the same elusive goals as a vandal.
If it weren't for computers, he could just as easily be spray-painting his
name on the side of a building, or perhaps even setting the building on
fire. As far as I can tell, a Crasher's only purpose is to make himself as
visible as possible among his peers and his vict inis. To attain this lofty
goal, he works to cause you as much trouble as he possibly can. And to
make sure you know who did it, he chooses a name, such as Crasher
One, that leaves no doubt in your mind.
I remember one Crasher who was bragging (a common activity)
about how he crashed one particular system. He was proud of this one,
because he had obtained the system operator's password - something
that's genuinely worth bragging about. After getting the password, he
waited a few days until the company was ready to back up the system
according to a schedule he had found. (Backing up is the process of
transferring information from the system onto tape to ensure against
66
CHAPTER FOUR Who Hacks and Why
accidental - or deliberate - loss. Most systems make it easy for a
hacker or anyone else to check on the last backup; sometimes, each
file has the last backup date on it.)
The Crasher waited until the time was right for his purposes. Just
before the backup procedure started, when his “strike” would damage
the most data and thus have the greatest impact on everyone con¬
cerned, he proceeded to erase all the files - no problem, if you have
succeeded in hacking the system operator’s password. 1 remember
afterward he said something like, “I thought they would only be down
a few hours and maybe lose a few days’ work. But it’s been over two
weeks now and they are still down.” He was very happy about that
particular result.
At the least destructive end of the Crasher spectrum, a system
crash can simply consist of removing one user’s electronic mail, or of
removing a single account so that its owner cannot log on until an oper¬
ator reactivates the account. On the other hand, a Crasher’s activity
can, and has, escalated as far as erasure of all programs and data on the
system, and to actual physical attacks on the computer. In most cases,
you can expect a Crasher’s tampering to result in several important
files, accounts, or both, going dead.
In general, before he makes his move, the Crasher will hole up
and spend a few hours reconnoitering the target system on Sunday
night. At this time, he will find out as much as he can about how the
system is run, and he will use what he learns to decide how he’s going
to crash the system for the greatest possible effect. This is when you
have the best chance of spotting and stopping him, because this is the
time he is finding out how not to get caught. After his reconnaissance,
when he knows what he will do - and when - the Crasher will log off
and bide his time, waiting for the Big Moment.
Depending on how the system is run, he may wait for several
days. Sometimes, for example, he’ll wait until the following Friday
night, because he thinks that no qualified personnel will be available
until Monday to take care of the problems he causes: All the people
who want to use the computer from a terminal over the weekend will
have to wait, and he will have intensified the losses inflicted on his vic¬
tims’ time, efforts, and patience.
67
OUT OF THt INNER CIRCLE
For the most part, Crashers usually don’t rate very high in the
estimation of other hackers. This is because Crashers do three things
that most hackers don’t like:
= They give all hackers a bad name.
= They close down accounts that other hackers spend much time
and effort to get.
= They often attempt to crash bulletin-board systems- the places
that most hackers use to communicate.
To sum it all up: They are not very nice guys.
The Thief The Thief is the rarest type of hacker. In fact, by my own and most
other hackers’ definitions, the Thief is not a hacker at all: He is a crim¬
inal. Although he is much more professional than any other hacker,
the Thief’s motives are perhaps the easiest to explain: He wants to
profit at your expense. In a majority of cases, there is no direct finan¬
cial gain involved; the profit usually takes the form of data stolen from
a competing company.
There is a fair chance that a Thief will include a bribed or black¬
mailed employee, a wiretap system, or some similar “standard” spying
techniques in his plan. Much more often, though, a Thief is part of the
company that is being robbed. He is seldom discovered, and simply
continues to drain away tens of thousands of dollars worth of informa¬
tion. The Thief’s victim, meanwhile, has no idea that anything of the
sort is going on.
Recent figures, cited in the Institute of Electrical and Electronic
Engineers’ journal Spectrum (“Can Computer Crime Be Stopped?”
May 1984), estimate that thieves collectively take as much as three
billion dollars from industry every year. While some authorities feel
that as many as five or ten percent of these thieves are caught, they
quite often get off with little or no punishment because, as the saying
goes, “all they did was push buttons.”
The law is changing rapidly in the area of high-tech theft, but
very few people in the criminal-justice system yet have a real under¬
standing of the technological details of computer crime. And that is
6B
CHAPTER FOUR Who Hacks anil Whf
one reason why these thieves are rarely prosecuted. One example
cited in the Spectrum article was that of a district attorney who failed
to prosecute the thief of a computer program estimated to be worth
over a million dollars. His reason for failing to prosecute was: “Why go
to court over $70 worth of punch cards?”
Most computer systems won’t ever be bothered by a Thief, but
those that are will suffer significant losses-losses that can be particu¬
larly troublesome because they are difficult to measure.
Because I feel that this subject is not computer hacking, but com¬
puter crime, I don’t consider myself qualified to tell you how to secure
your system from a Thief. Clearly, if you have Thief-tempting infor¬
mation or software on what you hope is a secure system, you would be
wise to try and eliminate the possibility that a Thief will find his way
into your files. If so, you may want to seek out other sources of in¬
formation or turn to well-qualified consultants for advice. Common
sense and the precautions suggested in this book should be enough to
protect most current computer systems from most current computer
hackers. If you are in any doubt about your system, however, my best
suggestion would be to hire a professional security consultant with
good references.
How much trouble will a hacker go to, if he wants to get onto your
computer? How much time and effort will he dedicate to breaking
your system’s security? The answers depend on several factors, es¬
pecially the type of hacker and the nature of your system.
The first-and least—level of effort that you will encounter is both the
most common and the safest from your point of view. Most hackers are
just looking for an open door so, at this level, the hacker is nosing
around, but has no particular reason to get onto your particular sys¬
tem. He has simply found or been given the system’s phone number or
network address and wants to check out your front-line security. He
will spend a few minutes with your system, testing for a few very basic
security flaws — for example, commonly used account names, such as
DEMO, TEST, GAMES, the name of the company, or a few of his own
TO WHAT
EXTENT A
HACKER HACKS
The First Level
69
OUT OF THE INNER CIRCLE
The Second Level
tried-and-true favorites. If he doesn’t get into your computer, he will,
at ieast fifty to sixty percent of the time, just move on to some other
company’s computer system.
Although this first level of hacking demands little effort and less
determination, you would be quite surprised at how successful hack¬
ers could be if they never tried anything more. I remember one system
that had a DEMO account with no password. All anyone had to do was
call the computer and type DEMO. After I had been on the system
awhile, I was contacted by the system operators, who were certain
that I must have had contacts inside the company. Again and again
they asked me, “How did you know about this account?” Again and
again I replied, “I just guessed.” It’s human nature, I suppose: System
programmers hate to admit that they left gaping holes in the system’s
security, and system operators are loath to admit that they left such
breaches unrepaired.
The second level of effort is usually expended by a hacker who hap¬
pens to like your computer system. Most hackers find themselves lik¬
ing one particular computer or operating system more than any other,
and to get onto one of these systems, they are willing to expend a little
extra effort. If your system happens to be a hacker’s favorite, you can
expect him to go beyond level one to test a few weaknesses that he
knows are unique to your system. Some versions of the Primos operat¬
ing system, for example, have built-in accounts that the system “de¬
faults” to, unless told otherwise, and that are well known to hackers,
who use them to gain access to the system. Some adaptations of UNIX,
another major operating system, sometimes have what hackers call a
“rapid-fire” loophole, which fools the operating system by having it
carry out a “high-level” command, when only a “low-level” one has
been approved. If such level-two attempts don’t succeed, the hacker
might then get serious and move up to level three, if he hasn’t had an
account on his favorite system in awhile.
Hackers working on level two, however, usually don’t like ma¬
chines that are on networks, because a network machine tends to re¬
ceive more than its share of hacking, and so its security weaknesses
are generally exposed by hackers and fixed by operators early in the
70
CHAPTER FOUR Who Hackt and Why
system’s life. If a hacker is trying to get an account on a computer that
is part of a public network, he often just goes directly to level three.
Level three is where the hacker really starts spending time on your
system. It may be that he has some inside information that will make
his job easier, or it simply may be that he specifically wants access to
your computer (possibly because of your company name or because of
the size or type of your computer).
At this point a hacker may start actually hacking. He may use a
database hack (described in the next chapter), which electronically
tries out a “library” of commonly used passwords, but more likely, he
will stick to making somewhere between forty and seventy educated
guesses at a viable password. The hacker on level three often ends up
succeeding without moving on to level four. If he has tried and failed,
he will move on about seventy-five to eighty-five percent of the time.
Level four is usually left to the Tourists, who are notorious for going to
extreme efforts to attain their goals. While some Tourists give up after
failing at levels one, two, and three, others feel that they must get into
your system or “lose the game,” so they move on to the more ad¬
vanced techniques of level four. They may resort to researching your
system users, or to visiting your computer room to look over shoul¬
ders or to read scribbled notes left near terminals. Or, they may set up
a computer to try every possible password-if that is what’s required.
A hacker working at level four succeeds in getting into a system
about ninety percent of the time. It is very possible, however, that the
system operators will be aware of him and throw him off the system
once he gets in, and for two reasons: First, the system is fairly secure
and the system operators may well be alert enough to find him and,
second, the hacker himself probably created quite a bit of detectable
evidence while he was operating at or building up to level four.
Level five consists of measures taken only by a Thief, unless you have
a very determined Tourist or Crasher on your hands. A hacker operat¬
ing at this level may plant bugs, bribe or blackmail employees, or pose
as a computer technician. More likely, though, he will be an employee
The Third Level
The Fourth Level
The Fifth Level
71
OUT OF T H i INNER C I R C L E
of the company that owns the computer. If you catch a hacker using
level-five techniques, take a look at the trail he left in your system. If
the hacker started out at level five, then he is very likely a Thief, be¬
cause other hackers will move up through the lower levels. In most
cases, a hacker on level five hopes your system will directly or indi¬
rectly provide a material gain for him, so he is willing to invest much
time, effort, even money, in staying out of trouble. He is also, for these
reasons, very difficult to find and catch.
CHAPTER FIVE
How a Hacker Hacks
N
JL. ^ ot long before I became a member of the Inner Circle, I was
exploring computers on my own when I happened upon a very low-
security password to a mainframe computer used by an East Coast
university. Designed primarily for demonstrations, this account didn’t
allow users to do anything very interesting (at least as far as I was
concerned). None of the computer’s more powerful programs could be
accessed by this account, and the storage space allotted to the account
was very limited. This demonstration account was good for starters,
but I really wanted a better account on that system - one that did not
restrict my explorations as much as this one did. And to get that better
account, I needed leverage; I found it in the operating system.
This system, like many mainframes at the time, had one very
interesting feature; If a person were to use a modem to call into his or
her account, then hang up without logging off, the first person to
phone in on the same line in the next ten minutes would automatically
be connected to the open account. What was actually happening here
73
OUT OF THE INKER CIRCLE
was a phone-based version of a situation in which someone walks
away from a terminal for a few minutes without logging off: Anyone
who might wander by could sit down and start using the open account,
and the computer would have no way of knowing whether the activity
on the account was coming from the authorized user or an intruder.
To me, this feature meant that 1 could, in theory, use someone
else’s account - possibly a much higher-level account than mine. But
most people do log off, so my chances of calling into an open account
really were not very good. Then too, even if I did manage to call into
someone’s account, I would have no way of learning the password, so I
could use the account only once. Not good enough.
There was another way, though. A way that would make this
feature of the system work forme: I could call and hang up on my own
account, my low-level account. That would leave the account open for
the next caller. Now, if that next caller did not know my account was
open and waiting-if that next caller tried to log onto the system - he
or she would very naturally enter both an account name and a pass¬
word. If I could then somehow read what the caller typed, I would be
able to use that person’s account. And 1 could keep trying the same
thing (assuming I wasn’t detected by the system operator) until I got
the type of high-level account I was after. Or, at the very least, I should
be able to use one of the new account/password combinations that I
“eavesdropped” on to better my position somehow on the system.
Eventually, I did end up with a high-level position on that system,
and I did it by writing a program, known to hackers as a decoy, that
pretended to be the operating system. When I left my original, low-
level account open, I also left this program running. When the next
call came into the system on my “open” phone I ine, my decoy program
displayed for the caller all of the “hello, please log on” messages that
the operating system itself would normally display. The difference
was, my program stored the caller’s account and password informa¬
tion in a special file I had set up for myself in the host system. Once the
caller had entered the information I wanted, I had the decoy program
display a message along the lines of “sorry, try again,” and turn control
over to the real operating system so the caller’s next attempt to log on
would be successful - and no one was any the wiser.
74
CHAPTER FIVE How a Hacker Hacks
One of the great appeals of hacking is the practical way in which it
builds on itself. New skills become old skills, but not before they’ve
provided a hacker with the foundation for a bigger and better “bag of
tricks” and a more sophisticated way of hacking.
While the word hacking itself implies that a person spends time
chopping away at something, about the only thing that a high-level
hacker hacks at in this sense (using techniques I’ll explain shortly) is a
password. Once a hacker has an account and password that allow him
access to a computer, his hacking becomes the type of planned and
deliberately executed activity that I tried to illustrate in the preceding
story. At this point, hacking is hands-on learning and testing, an excit¬
ing enterprise that depends on experience, skill, and a knowledge of
computers and computer operating systems. Now, the hacker is trying
to find his way to the top of the system, undetected. His goal: the
rights and privileges of the sysop himself and, with them, the freedom
to explore the computer and its files at will.
There are many techniques a hacker uses to try and attain this
ultimate goal. A few of them are based on educated guesses, but most
of a hacker’s approaches are based on experiments - experiments that
can range from trial-and-error “if at first you don’t succeed” attempts
to hack a password up to elaborate, controlled programs designed to
test, trick, or maneuver around the operating system, the system op¬
erator, or both.
A hacker may learn how to hack from other hackers or from
hands-on experience, but when he begins to spend hour after hour
playing with large computer systems and trying to gain access to
them, he very soon learns all the tricks that make life easier for him.
This chapter will tell you about the various tricks and techniques in
the hacker’s “toolkit,” but it’s important to realize that this toolkit goes
hand-in-glove with the hacker’s approach to hacking. Ultimately, the
way a hacker thinks is what distinguishes one hacker from another.
Just as a carpenter and a cabinetmaker can use many of the same tools,
but do vastly different things with them, so can a Student and a Tour¬
ist, or a Tourist and a Crasher. Their approaches are different, their
goals are different, and most importantly, their “products” are differ¬
ent, with different implications for your system’s security.
A HACKER’S
APPROACH
7S
OUT OF THE INNER CIRCLE
GENERAL
METHODS
Thinking Like
A User
Normally, two steps are involved in the basic methods hackers
use to gain unauthorized access to computers: First the hacker obtains
an account. That’s the easy part-sometimes it’s as easy as calling and
asking for one (posing as a university student, perhaps); more usually,
it means getting account names from bulletin boards, company phone
lists, or trash bins. ..maybe using a friend’s or relative’s account on
THE SOURCE, There are many ways, because account names are not
secret-the computer calls the user by this name or number, and users
often refer to other users by their accounts. It is the password that is a
secret. Therefore, a hacker’s second step involves ways of faking or
discovering passwords. This is one of the areas in which lax security
makes the hacker’s job easier than it need be: Well-chosen passwords
that are easy to remember, but difficult for a hacker to guess (yes,
there are such things), and educated users who keep secret passwords
secret are a very effective defense at this level of security.
As mentioned, hackers have a whole toolkit that they use to obtain
passwords and gain control of accounts. Three of a hacker’s most im¬
portant resources, however, are actually general, rather than specific,
methods of unlocking computers. These methods involve thinking
about “how to hack systems.” They are: thinking like a user, conduct¬
ing independent “research,” and using a system’s defaults, which are
its built-in assumptions about user needs.
Hacking is a game of wits, and the people who are drawn to it are the
same type of people who like to play chess or mental games with un¬
seen opponents. Part of the “psychology” of hacking involves cultivat¬
ing a skill for stepping into the shoes of the person who operates or
uses a computer system that a hacker seeks to penetrate.
The best hackers know that it is important to think like a user,
They constantly say to themselves, “What would I do if / were this
user?” If they are good at this kind of parallel thinking, they quite of¬
ten have very accurate insights into the word a user decides on as a
password. A user, remember, is anyone in a company or a university
who needs to use a computer to perform tasks: an executive who uses
76
CHAPTER FIVE How a Hacker Hacki
a spreadsheet program; a secretary who uses a word processor; a
scientist, engineer, or scholar who uses the computer to perform re¬
search calculations. And the characteristic all these people share is not
that they are fascinated by or know a lot about computers, but that
they want to get a job done. Often, they know very little about aspects
of the system that are not directly related to their needs.
Because computer users think of computers as tools, they are
often quite easy for a hacker to second-guess. For example, if they
don’t know or understand the significance of a password, they may
consider this very basic element of computer security as a simple nui¬
sance. And, in that case, they are quite inclined to choose a password
that is simple, easy to remember - and easy for a hacker to guess. On
the other hand, maybe they really can’t believe that anyone would try
to look inside the computer at MegaCar’s design memos or the results
of their latest research project, even though they would be very care¬
ful of the same information once it had been printed out on paper.
Uneducated users with attitudes like these represent a serious
concern for security-minded system owners and operators. If some¬
one were to attempt to tal k to them through the system, they would
have no way of telling a hacker from a system operator. From both
hearsay and experience, I can verify that many users never suspect
that the person asking for their password is a sixteen-year-old hacker
living two thousand miles away.
In a few cases, I have noticed that the need for management to
make computing cost-effective also seems to come into the picture.
After spending $30 million on a computer system that is not being
used to its full potential, management will often give accounts to peo¬
ple who have little desire or use for them. These users can end up with
several accounts on various company computers and, in such cases,
the users almost always use the same password for each account. Here
again, they are also likely to make it an easily remembered password,
and on top of that, since they don’t often use the system, they rarely
note unusual (hacker) activity on their accounts.
Sometimes, however, it is not enough to pretend to be a user and to try
thinking like one. Sometimes a hacker has to take steps to find out how
Research
77
OUT OF THE INNER CIRCLE
the users of certain computers actually think and what they actually
know. Often, this kind of research extends beyond the limits of what a
hacker can discover with only a computer and modem.
I once became involved in a “research” project when several
hackers were having trouble getting access to an IBM-370 - a state-
of-the-art mainframe. Ordinarily hardware is less important than
software, and software is not as important as the procedures used to
access and run the computer. In this case, however, the computer was
sealed tight at all levels. None of the usual or unusual tricks of the
trade succeeded in turning up a viable password.
The frustrated hackers sent out a message to The Cracker on a
private bulletin-board system they had been directed to by a member
of the Inner Circle, I answered, but I could do very little to help them
technically. This system had tight security, savvy system operators
who were unsympathetic to hackers, and sophisticated users. Then I
had an idea: Just because a computer is tightly secured doesn ! t mean
that the company throws unauthorized visitors out of the lobby.
One of the hackers lived near the company, so I suggested that he
write and print a one-page questionnaire on a letter-quality printer.
He was to stand in the lobby and hand out about 150 copies to em¬
ployees as they entered and left the building. He was to look and act
student-like, and represent the questionnaire as a class project. The
form asked the employee to answer some questions: name, address,
job description, title, whether or not the respondent used a computer
at work and so on, along the same lines. It also requested the em¬
ployees to leave the form in a certain place lor collection.
The strategy worked and, after the papers were collected, all the
resourceful hackers needed to do was to try different bits of informa¬
tion as passwords. In that particular case, the first names of the em¬
ployees worked hut, if not, the hackers could have tried the names of
wives, pets, cars, whatever — there were plenty of leads on those com¬
pleted questionnaires.
Of course, if the hacker had been asked to leave the company
building, he could also have left the questionnaires on the windshields
of the cars in the parking lot. Or he could have copied down some of
the license-plate numbers and then obtained the employees 1 home
78
CHAPTER FIVE How d Hacker Hach
addresses (from the Department of Motor Vehicles - possibly at a cost
of two dollars), so he could visit them personally, pretending it was a
door-to-door survey.
As this example illustrates, it happens that seemingly irrelevant
scraps of information (the name of a user’s pet dog, for example) can
often come in handy for the hacker. And good hackers try to collect
and remember everything they come across-information from ques¬
tionnaires, “chance” encounters with employees, conversations with
sympathetic system operators, the contents of electronic-mail files, or
anything they might learn about the company whose computer they
are trying to crack. If there’s a moral to this story, it’s a very simple
one: Educate your system’s users.
The most powerful computers have the most complicated operating
systems. And a powerful, complicated operating system has many
more options than any but the most fanatically devoted user would
ever be interested in using. For example, when a system operator is
given the task of creating a new account for a new user, there may be
several hundred different account “attributes” to set. These attributes
include such things as level of security, account name or number, ac¬
count password, and whether or not the user has the power to erase
other users’ files.
Because of the large number of potential attributes that can be
assigned to a given account, every complicated operating system has
many defaults that automatically select options instead of requiring
someone to specify them. A default is any option that gets “assigned”
because it is the most likely choice. For example, since very few users
have the power to erase other people’s files, the attribute that decides
whether a user has this power may automatically default to “no” if the
operator does not specifically assign “yes.”
In some cases, default accounts, rather than just options, are
present on a system to perform housekeeping functions, such as tak¬
ing care of backup files or watching over help files; in others, default
passwords are used. In some of the less helpful, but still very popular,
defaults, last names are used as accounts or birthdates are used as
passwords. Defaults make life easier for system operators, because the
Defaults
79
OUT OF THE INKER CIRCLE
SPECIFIC
METHODS
operators can simply write a program that says “last name = account
name, birthdate = password,” and so on, and then the program will go
through a user’s file and assign the correct default settings quickly and
automatically.
Hackers love defaults. They make life easier for hackers, too.
Defaults seem to be a hacker-friendly feature that will be with the
world as long as computers need complicated operating systems - and
that means they will be with us for the foreseeable future.
Hackers could probably spend the rest of their lives finding out
about and using all the various default values, simply because they are
there, and no one ever seems to want to change them. Certain ver¬
sions of one operating system gained a reputation in the hacking com¬
munity in terms of defaults. These were versions of Primos, now a
very secure operating system that is run on Prime computers. (If you
are not familiar with these machines, Prime computers are the ones
used by THE SOURCE, a popular information utility that more than
fifty thousand owners of personal computers use via their modems to
find out about the stock market, make airline reservations, research
the utility’s information data bases, and exchange information with
other subscribers.)
The major security problem with these versions of Primos is that
they had certain default accounts that existed when the system was
first installed - accounts that were not meant to be used, and that
had no passwords. These accounts existed primarily as maintenance
accounts for the system — various programs could be set up to run
“under” these accounts.
Thinking like a user, research, and defaults are all-purpose elements
of a hacker’s toolkit, but most of the methods used by hackers involve
much more specific techniques. Through the process of trial and error,
and from their own knowledge of telecommunications networks and
operating systems, hackers have developed a number of approaches to
hacking passwords, obtaining new accounts, and working inside the
system. The rest of the descriptions in this chapter are of just such
specific tools.
80
CHAPTER FIVE How o Hacker Hacks
The basic form of the hack-hack method is the technique non-hackers
most commonly associate with hacking, It is also a technique that is
seldom used by anyone but the rawest Novices. A hacker using a
“pure” version of the hack-hack method would do the following: First,
he would obtain at least one account name; more likely he would get
five to ten, Then, he would program a personal computer to: (1) phone
the remote computer, (2) transmit the account names he had obtained,
and (3) try different passwords on each account name. These password
attempts would be generated by the hacker’s program and could be
either random strings of characters or sequential attempts, such as
AAAAAA, AAAAAB, AAAAAC, AAAAAD, and so on.
On the surface, the hack-hack method sounds simple and logical,
but if you think about it, there is almost no way, other than sheer
accident, that a hacker could be very successful using this method with
currently available computer technology. In fact, rumors floating
around the hacker underground claim that the only people who use
this method work for government task forces (in either investigative
or intelligence agencies); they are the only people who have the giant,
high-speed supercomputers that can do such a task successfully.
Even if a hacker could program his computer to try a new pass¬
word, say, once every ten seconds (very unlikely, because the remote
computer will probably take longer than that to respond to each at¬
tempt), and even if he limited the words to four upper- or lowercase
letters of the alphabet, it could easily take the hacker almost two
months of twenty-four-hour hacking to go through every possible
combination. In addition, he would need to try these passwords on at
least three or four accounts.
But this situation, really, is the best of all possible worlds. In most
cases, the hacker would face even more problems: He could only try
(on average) once every fifteen or twenty seconds. He would have to
assume that the passwords were at least six characters long. He might
need to use both upper- and lowercase Letters. In many cases, spaces or
other non-alphabetic characters might very well be used.
(Just for fun, you can figure out what kind of time would be in¬
volved here. Attempting one six-character combination of upper- and
lowercase letters every twenty seconds, the hacker would take more
81
Hack-Hack
our OF THE INNER CIRCLE
Variations
On a Theme
than twelve-and-a-half thousand years to go through every possible
combination. Obviously, he would get lucky at some point but, even so,
that hacker could be at it a long time.)
If, after all that work, the hacker should become very lucky and
get a valid password with the hack-hack method, the system operators
would be ready and waiting for him: There wouldn’t be any way they
could not notice such constant hacking.
A sysop watching an account while a hack-hack attack was under
way would see that not only was the user making repeated attempts to
enter a password, but that the passwords differed according to a set
pattern-AAA, AAB, AAC, for example. Even a system operator who
did not have to be particularly careful about security would be very
likely to spot such a systematic attempt to guess a password.
There are, however, a few more sensible versions of the hack-hack
method. The first of these, the short hack, is very straightforward
testing of five to fifteen or thirty accounts. This method assumes that
one of these accounts will have a single-character password, so it will
try each account either twenty-six times (once for each letter of the
alphabet) or fifty-two times (if both upper- and lowercase are needed).
A hacker might do this testing manually, but since it is the type of te¬
dious but systematic task that computers can do so well, it is more
likely that the hacker will write a simple program to try all these
variations and notify him when one of the variations is successful.
This method has many problems of its own, but when it’s suc¬
cessful, the hacker can often be on the system the day after he starts.
Single-character passwords are very convenient for users to remem¬
ber. And no hacker is going to argue with results.
A second variation of the hack-hack method tackles the problem
from the other side. It is called the reverse hack, and instead of trying
many possible passwords on one account, it takes two or three very
common passwords and tests them on anywhere from twenty to two
hundred accounts. For example, the word password, obvious as it
seems, is very often used by naive users. If a hacker had a list of twenty
account names, he could use the reverse hack by programming his
computer to call the remote system and try the word password as a
82
CHAPTER TIVE How a Hacker Hacks
password on each of the account names. The reverse hack quite often
bypasses some system security because, on many systems, the oper¬
ator doesn’t get notified of two or three unsuccessful log-on attempts
on one account - the computer only notifies him about many unsuc¬
cessful attempts on one account.
From my experience, it seems most people don’t pay much atten¬
tion to choosing their “secret” passwords. By browsing and experi¬
menting, I’ve found that the three most common password choices are
secret, love, and sex ... though not necessarily in that order.
Both the hack-hack and reverse-hack methods rely heavily on
chance, so it is very hard to predict whether these methods will suc¬
ceed in ten minutes or ten hours. A third variation, however, is per¬
haps the most often successful as far as these methods go. It is known
as the database hack. The hacker who uses this method tries ten to
twenty accounts, and he tries passwords to these from a data base, or
“library,” of anywhere from twenty to five hundred commonly used
passwords. The data base contains words that the hacker knows to be
common passwords. A typical file would contain such entries as: Love,
Sex, Secret, Demo, Games, Test, Account, Intro, Password, Alpha,
Hello, Kill, Beta, Dollar, Dead, System, Computer, Work, Yes, No,
Please, Ok, Okay, God (popular with system operators). Superuser
(another good one for sysops), Aid, Help, the name of the company,
formatted in various ways, for example, MegaCar, Mcar, Megcar,
Mega, MC, Car, the letters A through Z, two to four hundred first
names, possibly ten or twenty names of pop musical groups, possibly
five to ten names of automobiles, the digits 0 through 9.
While it is quite often successful, the database hack is normally
used only on systems where the system operator is either known to be
sympathetic to hackers or just doesn’t care, because this is another
method that, with its repeated attempts on the system, will probably
have the system operator waiting once the hacker gets in.
The three hack-hack variations are very simple and are used mostly
by novice hackers. Higher-level hackers prefer to use their wits, in¬
stead of a brute-force assault. One of the more sophisticated hacking
tools is known as the decoy, and it comes in three versions.
The Decoy
83
0 IM Of 1 HE INNER CIRCLE
The first version of this trick is the one I described at the begin¬
ning of this chapter, and it requires that the hacker have an account on
the system in question. As in my case, the hacker has a low-security
account, and he tries this method to get a higher-security account. He
will first use his low-security account to write a program that will em¬
ulate the log-on procedures of the system in question. This program
will do the following:
= Clear the terminal screen and place text on it that makes every¬
thing look as if the system is in charge.
= Prompt for ; and allow the user to enter ; both an account name
and a password.
= Save that information in a place the hacker can access,
~ Tell the user the account /password entries are not acceptable .
~ Turn control of the terminal back over to the system ,
The user will now assume that the account name or password was
mistyped and will try again,. .this time (since the real operating sys¬
tem is in control) with more success. You can see a diagram of the way
these steps are accomplished on the following page.
After writing this program, the hacker can either set it running
from afar, as I did, or, if he has access to the building, he can go to
various terminals and run his program on each one individually. Re¬
gardless, when the people try to log on to their accounts, the hacker's
program will record the users’ accounts and passwords. In many cases
the hacker may have his program tell the user that the system is down
for five minutes, rather than have it tell him to try again. In any case,
the user will have to log on again.
The decoy is potentially even more useful to a hacker if he has a
little bit of help from the phone company, and a handy service known
as call forwarding.
Many people use call forwarding by special arrangement with
the phone company. When a customer requests call forwarding, the
phone company uses its computers to forward all the customer’s in¬
coming calls to another number. Let’s say, for example, that you want
84
CHAPTER FIVE How a Hack&r Hacki
calls that come to your office phone to be forwarded to your home
phone: A call from you to the phone company, some special settings in
the phone company's computer, and all calls to your office will ring at
your home instead.
85
OUT OF J H F INNER CIRCLE
Law-abiding citizens can simply request call forwarding; hackers
have to be less direct, since they are forwarding someone else's num¬
ber, not their own. Still, this obstacle is usually not a problem, since
many hackers also happen to work for the telephone company. In one
case, I helped a group of hackers use call forwarding to gain access to a
Prime computer in their vicinity This system was hooked up to one of
the phone company's more advanced switching systems, so it was a
simple matter to have a contact within the phone company set call for¬
warding on the phone line going into the system in question. After my
contact set call forwarding on our target's number, I told the hacker
how to go to the building housing the computer and set call forwarding
to one of the group’s phone numbers. There, they had a personal com¬
puter waiting with a decoy program set up to mimic the real system.
This decoy allowed a caller to enter an account and password, then it
displayed an appropriate “log-on unsuccessful” message and hung up
on the caller. Even though it emulated the real system for only a mat¬
ter of seconds, the decoy program kept the forwarded line open for
five minutes after terminating the user’s call. This was because we ex¬
pected the user to call back and try to log on again. To avoid suspicion,
we wanted the second attempt to be successful. By keeping “our” line
open, we could ensure that the user’s next call would go through on a
“real” line to the real computer.
There are a few other versions of the decoy trick that hackers
use, too. One is very similar to the last I described. The hacker must
write essentially the same program, to display the text that simulates
the target computer’s log-on sequence. He also must have some type of
account on the computer. In addition, the computer system in question
must have some form of chat , send, or talk program that enables the
user of one account to interact with the user of another.
To put this version to work, the hacker must first establish con¬
tact with the person using the account for which he wants the pass¬
word. The hacker will then activate his decoy program, which will
send text to the remote user. The text will inform the user of a “fatal
error” (a bit of computer jargon that simply means “you messed up,”
even though it often strikes terror into the heart of a naive user), and
then the decoy program will simulate the log-on sequence. The user is
86
CHAPTER FIVE How a Hacker Hacki
still logged on, still doing whatever he or she was doing. But suddenly,
text appears on the screen requesting another log-on attempt, after
which the hacker allows the user back onto the system.
This trick is infamous for fooling subscribers of THE SOURCE
and CompuServe (another commercial information utility.) In fact,
every time you enter a program to talk with other users on Compu¬
Serve, you see the message: WARNING: NEVER ENTER YOUR PASS¬
WORD WHILE IN CB OR TALK. This precaution is a good idea for any
system that allows users to interact.
Another version of this technique differs a great deal from the
other two in that this procedure needs much more help from a user.
Version three is usually only effective when the hacker is trying to get
an account from a service computer, such as the ones used by Dow
Jones, THE SOURCE, CompuServe, DIALOG, or any of the other
timeshare-oriented computers serving a large number of people. This
trick goes something like this:
The hacker contacts a person who uses the computer he wants
access to - perhaps he knows the person, or perhaps he might buy a
mailing list from the computer-owning company itself. In his contact
(either a letter or a phone call), the hacker says that a new, local dial-up
service is available that will be cheaper and faster to use, and he lists
the phone number to call. The hacker has a personal computer set up
at the phone number to emulate the system the user expects to see.
Once the user calls the number with his own terminal and enters his
account and password, the hacker’s program tells the user that the
dial-up service is not available at this time, but that he will receive a no¬
tice from the company once it is.
Computer memory is roughly comparable to, say, the cells in a bee¬
hive. Altogether, these “cells” can hold a great deal of information.
Each cell, however, is also an independent unit, with its own location
(address in computer terminology) and its own storage capacity.
Hackers sometimes find that a particular operating system will
allow them to do things directly to memory that they otherwise could
not do, and many hackers try, sooner or later, to gain access to inde¬
pendent memory locations in the target computer. Obviously, if you
Using Computer
Memory
87
our Of T H E INNER CIRCLE
have the power to change what is stored in the target computer's mem¬
ory, you have the power to command that computer to do all sorts of
things. This method of hacking tries to bypass the operating system
altogether, and requires knowledge of mainframe computer program¬
ming, since such programming tools are what you need if you want to
change the contents of the computer’s memory One common way
hackers use this technique is in accessing the text buffers (the place in
the target computer’s memory where incoming keystrokes are col¬
lected) to find out what a user entered as a password. Another pos¬
sibility in some systems is changing a cell in memory so that you can
erase a file you do not have authorization to erase - an important
point, since erasing files is sometimes necessary to prevent damage.
Quite often, hackers use BASIC programs to manipulate mem¬
ory, but any one of several other computer languages could also be
used; BASIC, because it is so common, is simply the language most
likely to be “understood 5 ' by a target computer. If you know BASIC
programming, you know that most versions of BASIC use two com¬
mands to access independent memory locations: PEEK to read the
contents, and POKE to change what's there. You use a PEEK command
to find out exactly what information is stored at a specific location in
your target computer’s memory Then, if you want, you can use a
POKE command to change the contents of that location, and thus
change the way the target computer operates.
One Inner Circle member used a BASIC program of this sort to
PEEK at passwords stored in the memory of a computer located in the
research-and-development department of a major corporation. First,
the hacker created a file named Top Secret, which was placed in a
“common area” that all accounts would access and was certain to at¬
tract the curiosity of users, who would want to run the program just to
find out what it did. In this case, whenever curious users ran the file,
they saw an innocuous message: I SAID THIS WAS TOP SECRET!!
Little did they know that running the file did a lot more than type a
silly message onto the screen. (Technically, this kind of file is another
kind of hacker’s trick, known as a Trojan horse, which is explained in
detail later. In this case, however, it serves as an interesting example of
the way in which a hacker can manipulate computer memory.)
88
C M A P I £ G FIVE How a Hacker Hacki
Because the hacker had done some previous exploring with the
POKE and PEEK commands, he had been able to find the memory
location where his own password was kept while he was logged on*
He figured he could write a program including a routine that used the
PEEK command to look at these memory locations, and when other
people ran his program, they could find their own passwords, too.
He took this idea a bit further and wrote a BASIC program that
would PEEK at the password of any account that ran the program.
Thus, whenever people ran Top Secret, they were unwittingly helping
the hacker find their passwords. The hacker also set up the program so
that it would store all of these passwords in a file—all he had to do was
leave the system alone for a week, and harvest the passwords later by
accessing this special file*
Because of the level of programming and systems knowledge re¬
quired to use techniques involving memory-location manipulations,
only high-level hackers, like those of the Inner Circle, would attempt
such feats. Most hackers are kept busy trying to keep up with system
operators at lower levels.
Memory-location manipulation can be helpful, but there is another,
more powerful, possibility, in some cases: the rapid-fire method. Fm
not quite sure who named this method, but “rapid fire” is accurate to
some degree. To understand this method, you have to blow some¬
thing about the way most operating systems work.
When a user enters a command* the operating system first places
the command in a holding area, a buffer, where it will sit for a few
millionths of a second. The system looks at the command and says,
“Does this person really have authorization to do this, or not?” Then,
the command sits there a few thousandths of a second while the system
runs off to check the user’s authorization. When the system comes
back to the command, it will have one of two possible answers: “OK,
go ahead,” or “Sorry, get permission first ”
Once you are on a system that handles things this way, you can
use the rapid-fire method to change the command while it's sitting in
the buffer, waiting to be executed* If you can do this, you can do any¬
thing. You can enter a command that you blow will be approved, such
Rapid Fire
89
OUT OF THE INNER CIRCLE
Remote Sysop
as “tell me the time.” As soon as the system runs off to verify your
right to know the time, you change the command in the buffer to
something you know would not be approved - perhaps “give me a list
of all the passwords/ 9 When the system comes back with an “OK, go
ahead ” it responds to your second command, not the first.
Of course, this exchange has to be done very rapidly, but most
systems existing today can be fooled by this trick. The question is,
how easy is it to do, and how much authority do you need? I know of
one system that let this one slip.
I had an account on a VAX that was used by a large corporation, a
company that had many contracts with the United States Department
of Defense. I thought it would be nice to gain access to the corpora¬
tion's intra-company network, because I would then have access to
many different computers. My account was, of course, not authorized
to link to the network that I wanted to use.
This system was a bit overused, and therefore was a little more
vulnerable than most to attack by the rapid-fire technique: Its capabil¬
ities were taxed, so its response time was relatively slow. Knowing
this, I wrote a program, in the computer language known as C, that
would replace the command in the buffer with the VMS SET HOST
command that would allow me to use the company's network. Once
that program was written, all I had to do was issue a command that I
had authority to issue, run my program between the time the system
authorized my request and the time the system actually executed it,
and there I had it: access to the entire network.
This would be like sending a message in to your boss, asking for
his permission to get a drink of water. When the paper comes back,
with your boss's signature saying that you have authority to get a
drink, you change the text of the message so that it says that you have
authority to take the week off — with pay As obvious as this tactic
might seem, it worked quite well for my purposes.
The remote-sysop method of security cracking is possible on only a
few systems. It requires a program that will allow one user of the tar¬
get computer system to send messages to another user on the same
system. In this particular case, the message sender is the hacker, and
90
CHAPTER FITE How a Hacker Hacks
the receiver is the system operator - or rather, the system operator’s
terminal. The goal: fooling the computer into thinking that you are the
sysop. The details are somewhat complicated, but this trick works for a
very simple reason. When someone logs onto a computer system, the
computer has to assume that any information coming from that termi¬
nal is being typed by the authorized owner of the account; the com¬
puter has no way to tell the real user from an impostor.
If a message-sending program already exists on the system, the
hacker must modify it a little bit so that it will work for him. If there is
no such program, the hacker may well decide to write his own. In fact,
from an advanced hacker’s point of view, it’s probably best if there is
no established program for this type of message exchange.
However he gets it, once the hacker has a program that can send
messages to people, he can start putting the first stages of the remote-
sysop scheme into action. He begins by finding out what terminal the
system operator is logged onto. This is normally very simple, because
the system tells you if you ask: On a DEC-10, and on many other sys¬
tems, the command is SYSTAT; on VMS and several other systems, the
command is SHOW USERS.
Once the hacker knows which terminal is the system operator’s,
he can then get down to business. If you are not familiar with comput¬
ers, some of these details may seem rather confusing, so I will take the
chance of overexplaining what happens next.
First, the hacker sets up his own account in a special way: He
fixes it so that the operating system will not interpret his pressing the
return key as what is known as a delimiter. When you press the return
key (or any other key) on a computer keyboard, that keystroke is
translated into the appropriate ASCII code. Normally, the operating
system interprets the return-key code as the end of something: If
there is one return, that means the end of a user-to-computer com¬
mand, such as ERASE FILE <RETURN> or LOG OFF <RETURN>.
During a remote sysop, if the return key is followed by another special
character, for example, a combination of the Control key and the let¬
ter J, the operating system may interpret the Control-J sequence
rather than the Return key as the end of a user-to-user message. In this
case, Control-J is the delimiter.
9t
OUT Of THE INNER CIRCLE
The Trapdoor
When the hacker tells the operating system NOT to interpret his
return key as a delimiter while he is typing , what he is actually doing is
incorporating both a command and the “now go carry it out” signal
within a message - a message that he sends to the system operator’s
terminal, which then carries out the “message” as the command it ac¬
tually represents.
By forcing the message-passing program to take a return key¬
stroke as data and send it to the system operator’s terminal, the hacker
gains the power to do anything the system operator can do to assign
passwords, erase files, create accounts, grant levels of power to in¬
dividual users, even remove every account and file on the system. One
of the common things to do, once you seize control of the system op¬
erator’s terminal, is change his own password and log him out. When
the system operator is one who is known to be hostile, backers take
particular delight in pulling this prank. Another popular sequence of
commands forces the operator to grant operator powers to the ac¬
count the hacker is on at the moment.
In one instance, there was a UNIX system running on a super¬
mini belonging to a large oil company. I got to know the system oper¬
ator quite well and, during one of our early chats, I mentioned that I
would like to gain superuser (system operator) status. The sysop said,
“Well, I’m not going to give things like that away, but if you should
happen to ‘acquire’ superuser status on your own without my help
(which is impossible), I don’t suppose I could stop you, could I?” Natu¬
rally, that was a direct challenge. I pulled a remote-sysop tactic a few
nights later, and I was a superuser for three months before he found
out about it. This particular trick worked on this particular version of
UNIX. It would not, for technical reasons, work on most others.
A trapdoor is a set of special instructions embedded in the large pro¬
gram that is the operating system of a computer. A permanent, hope¬
fully secret “doorway,” these special instructions enable anyone who
knows about them to bypass normal security procedures and to gain
access to the computer’s files. Although they may sound sinister, trap¬
doors were not invented by hackers, although existing ones are cer¬
tainly used by hackers who find out about them.
92
CHAPTER FIVE How a Hacker Hacks
A trapdoor is originally set up by someone who is either on the
system or is one of the people who created it. If you saw the movie
WarCames, you may recall that the young hacker stumbled over a
hidden code word, Joshua, that the system’s creator had embedded in
the computer’s operating system. Joshua was a trapdoor — a rather
unrealistic example, but nevertheless one of the more accurate hacker
secrets portrayed in that movie. A real-life trapdoor is not likely to be
an invitation to play with a war machine - at least not on the hacker
level. In fact, I once came across a computer in which a trapdoor was
used for something like poetic justice. This computer had a games
account on it. The problem was, there were no games on that system
worth playing. 1 was looking around the files that were kept under the
games account, and discovered that the account itself was a very high-
level account. As it turned out, this account was set up by the system
operators because their boss insisted on having a higher-level account
than theirs. They gave him one, but they set up this games account to
keep an eye on him. He never thought to check the security of the
games account.
A perfect trapdoor would be impossible to detect, and it would
allow the person using it to log onto the system even if the system op¬
erators cleaned out every account and started all over, from scratch.
This type of trapdoor, as far as I know, can only be planted by a person
who is or was directly responsible for creating the software used in the
operation of the target computer system.
It is very possible that, somewhere, there is a system that will let
you onto any account you wish by entering MY*LITTLE#SECRET as a
password. Almost anything is possible if the system programmer or
the system operator is involved - even an account that would leave no
record of its existence in the normal files and that could, consequently,
be used quite freely, and for virtually any purpose. I’ve spent many
hours in conversation with system operators and system program¬
mers, and I would venture to guess that every large computer system
in the world has some type of trapdoor built into it. Even video games
and personal-computer software have trapdoors built into them.
Trapdoors are just the kind of temptation that a programmer is utterly
incapable of resisting.
93
OUr OF THE I H K E # C 1 ft C L E
A trapdoor set up by a hacker usually is not as effective or power¬
ful as those created by system programmers or system operators, un¬
less the hacker had access to an operator account. Normally, a hacker’s
trapdoor is something as simple as a second account that he never uses.
Or sometimes a hacker may set the system’s electronic-mail program
to send the system operator a letter four months in the future, asking
the sysop to set up a new account. (Most mail systems allow you to
create a letter and then instruct the system to post it at a specified later
date.) In that way, the operator may set up the requested account after
the hacker has been found and thrown off the system.
Advanced hackers tend not to worry too much about setting up
their own trapdoors, unless they have very powerful accounts. If they
worry about trapdoors at all, they try to find those that were left by a
powerful user. It is easier to exploit a known trapdoor than it is to cre¬
ate one from scratch. Novices stay away from trapdoors because they
rarely know where such things are located in the operating system’s
programming code, and they usually don’t know how to handle trap¬
doors, even if they are able to find them.
The Trojan Horse A Trojan horse works much like the original wooden statue that the
Greeks presented at the walls of Troy - it is an attractive or innocent¬
looking structure (in this case, a program) that contains a hidden trick,
a trick in the form of buried programming code that can give a hacker
surreptitious entry to the system that unknowingly invites the Trojan
horse within its figurative walls.
The Trojan horse is very simple in theory, but also very effective
when it works. The program that is written or modified to be a Trojan
horse is designed to achieve two major goals: First, it tries to look very
innocent and tempting to run, and second, it has within itself a few
high-security tasks to try. A Trojan-horse program must be run by a
user, and one whom the hacker hopes is a relatively powerful user on
the target system. The effectiveness of a Trojan horse program de¬
pends on the fact that certain users can accomplish certain security-
related tasks, while the system will stop other, nonauthorized, users. If
a “normal-security” user tries to give himself a very powerful position
in the system’s hierarchy, the computer stops him. But if the system
94
CHIMED FIVE How a factor fads
operator tries to give the same user this position, the computer won’t
question the move.
Once again, a hacker must have an account on the system he
wants in order for this trick to work but, as you’ve seen, it is normally
no problem for the hacker to get a low-security account on a system.
Once he has this account, he either writes a new program or modifies
an existing program to turn it into a Trojan horse.
If a normal user tries to run the program, it won’t do anything to
help the hacker; but if the owner of a very high-security account runs
the program, the power allotted to that account will enable the hidden
code in the program to perform some high-security task the hacker
wants done. This task will probably create a new and powerful account
for the hacker, or it will give the hacker’s existing account a new,
higher-security status. If the program is well written, the person who
ran it will never know that he has helped a hacker.
In terms of privileges and levels of security, the system operator
is the most powerful user on a computer. So, if the system will allow it,
a hacker tries to modify one of the system operator’s files as a Trojan
horse. Assuming that this would work, the diagram on the following
page outlines the steps that a hypothetical Trojan horse would take if
the hacker modified a system operator’s file. (The system file chosen
for the example calculates the amount of memory available to a user.)
In most cases, however, Trojan horses have to look like a game of
some sort. This way, the hacker can write a short, but interesting,
game that he hopes will interest the system operator. In one case that
involved the Inner Circle, the trick was very well done.
The incident took place on a VAX located in Canada. The owner
used this computer for some type of statistical or demographics work,
but I was using it to teach some of our members about VMS, its operat¬
ing system. We had a small bulletin-board program set up, and we
would “meet” there every now and then to try out VMS. After a while
we were discovered, of course, but one of our members managed to
strike a deal with the operators.
Among the VAX’s programs, there was a chess program. It was
agreed that the operators would use it to play a game of chess against
the hacker, one move a day. If the chess program (the operators) won,
95
OUr OF THE INNER CIRCLE
THE
f I ACKER'S
HIDDEN
TASKS
CHIMES FIVE Haw a Hacker Hacks
the Inner Circle would leave. But if the hacker managed to win, they
would play another game, and the Inner Circle would be allowed to
stay on the computer while the game was in process.
As you’ve no doubt guessed, the hacker turned the chess pro¬
gram into a Trojan horse. He had made sure the system operators had
a reason to run this particular program... and he also altered it. Each
time the system operators ran the chess game to make their daily
moves, that same “innocent” program made the hacker’s current ac¬
count more powerful. The hacker figured that if the sysops were going
to let a computer help them win at chess, he could make the game
work both ways.
An operating system is a fiendishly complicated piece of programming
code, and not even experts are able to determine what every single in¬
struction in a complex operating system is intended to do. Because of
this, clever programmers have the power to embed their own secret
programs in any operating systems they create. A trapdoor is the most
common example, and is simply a hidden subprogram that allows the
system programmer to enter the system any time he wants to do so. A
logic bomb is a more potent variation of the trapdoor.
Like the trapdoor, a logic bomb is a bit of programming code
planted or built into a system - but a logic bomb can instruct the com¬
puter to do far more dangerous things than simply provide free access.
For example, one communications software program is supposed to
have a certain feature in it: If the program is sent a sequence of three
control characters, in a certain order, it will return to the sender the
serial number of the software. And it is rumored that the programmer
of this software has a way to destroy illegal copies of his program from
a remote location. Here’s the connection: The rumor is that he uses the
first logic bomb (the control-character sequences), via bulletin-boards,
to check for pirated versions of his telecommunications program, and
that he uses the second logic bomb to destroy them.
This self-protection scheme aside, however, logic bombs are nor¬
mally very nasty little pieces of software trickery, and they are held in
utter contempt by hackers of the Inner Circle kind, who prize knowl¬
edge of computers far more than the power to destroy them. Logic
Logic Bombs
97
oar OF THE f N N f R CIRCLE
bombs are very difficult to find, because they can be fairly short pro¬
grams hidden away in the much longer and more complex operating
system of the target computer. Often, they are built into the software
of a computer system by one of the programmers who designed it.
Sometimes, and this is a particularly threatening feature of logic
bombs, they can be inserted and/or triggered remotely, like timed de¬
vices activated via long-distance telephone. And this capability raises
the potential for one of the worst possible outcomes of an unwanted
invasion: the malicious and irreversible destruction of computer files,
carried out by a vandal who is probably hundreds of miles away and is
almost always totally anonymous and untraceable.
Just as a virus takes over the control mechanism of an infected
cell and uses the cell’s own biological machinery to do its damage, a
logic bomb is capable of fooling the infected computer into erasing
selected files - or even all the files that are stored online (under the
control of the computer’s central processor). In the case of financial
information, this kind of erasure could mean the loss of millions or
billions of dollars. On the other hand, suppose the computer files con¬
tained information on, let’s say, patient medication records in a cancer-
research hospital. The loss then would be measured in terms of human
suffering, rather than dollars.
Logic bombs are feared, and correctly so, by the people responsi¬
ble for the integrity of some of the most valuable computer data in the
world. Whereas a Trojan horse allows access to high-security com¬
mands, and a trapdoor program admits its creator to the system, a
logic bomb is a Crasher’s weapon, used to damage a system. The
bomb can be set to damage the system in some way when a particular
high-security user runs the program containing it. Or, it can be set to
detonate if a certain special condition appears or occurs.
Suppose, for example, there were a system programmer who
was very, very good at creating operating systems. Every computer
needs an operating system, and since every company’s needs differ, a
customized version of the standard operating system must be created
for every large computer installation, it is often the case that these
systems, or significant parts of them, are created by one person-for
our purposes, our very, very good programmer.
98
CHAPTER FIVE New a Hacker Hacks
Assume, now, that this person was responsible for customizing
an extremely complicated operating system and knew that a virtually
undetectable program slipped into that system would ensure his own
job security. Would such a programmer be tempted? As you’ll see,
more than one system programmer has fallen for this temptation.
Although I and the other members of the Inner Circle always
avoided and dissociated ourselves from destructive pranks, we still
heard the stories. One of the standard stories that system operators
like to tell their favorite hackers late at night was recently discussed by
Peter J. Ognibene, in an article entitled “Computer Saboteurs” (Sci¬
ence Digest, July 1984), detailing “several incidents in which people
who were fired managed to slip into the payroll software a new in¬
struction, which said, in effect, ‘When a certain name is deleted from
the payroll, delete all other names and records.’ The name mentioned
was, of course, that of the recently fired employee.”
Ognibene also mentioned another variety of logic bomb hackers
sometimes talk about, a program created not by an employee, but by a
company that creates commercial software: “Some software vendors
put logic bombs in programs they lease. Then, if the customer fails to
pay the renewal fee on time, the software self-destructs. Other cases
involve former employees who put disruptive logic bombs in software
they are working on just before they leave a company. Then they go
into business for themselves, selling similar programs that are, of
course, bug-free.” Individual software authors, like the telecommuni¬
cations programmer mentioned earlier, have also been known to use
logic bombs in commercial programs they have created.
But the scariest aspect of logic bombs, to my way of thinking, is
that they could be delivered and triggered by a hacker. It is true that
there is always something to fear from any system programmer who is
in a position to know more about an operating system than anybody
else. But there is usually only one, or a very small group of people in
this category, and their identities are known. There are hundreds, per¬
haps thousands, of hackers with modems, however, and those few who
are crashers, and the fewer still who are clever enough to build an un¬
detectable logic bomb, pose a very real danger to any computer sys¬
tem that is accessible via common-carrier communication lines.
99
OUT OF THE INNER CIRCLE
Worm Programs
The only way to be absolutely certain that an outsider hasn’t
planted a logic bomb in your computer is to be absolutely certain that
outsiders are unable to get into your system in the first place. I’ll dis¬
cuss these countermeasures in detail in Chapter Seven.
Worm programs are different things to different people. To science-
fiction fans, the term may bring to mind a program that reproduces it¬
self so fast it is impossible to destroy. But by my definition, a worm
program is more straightforward. It is simply a program that is in¬
stalled into the system so that whenever the system is brought up, the
worm program is run along with many others. It runs without a termi¬
nal, under a name that fits right into the system operator’s idea of what
should be there, and is never found out unless (or until) it purges itself.
In my opinion, the single attribute that makes a program a worm pro¬
gram is the fact that it does not use a single account like users do - it
uses only “unused” computer resources.
When a computer can handle, say, a hundred different users,
there is a tendency for that system to waste a lot of its time. A com¬
puter system is set up to divide its time among its various jobs. Every
terminal hooked up to the system represents one job that the system
has to take some time out to handle, even if there is no one using that
terminal at the moment. If there is no one using a particular terminal,
the system is wasting its time by just “waiting” for someone to use the
terminal. A worm program takes advantage of some of this wasted
time, and operates on the slack of everyone else’s computing power.
Some types of worms must be run in many different “segments,”
with each segment having the information needed to rebuild a few of
the preceding and following segments—much as cells contain the DNA
needed to build new skin, bones, even whole bodies. Worm programs
are unobtrusive, low-priority programs that run on “extra” time, so
there is a possibility that a normal program may suddenly require part
of the memory that is being used by the worm segment. This pre¬
empting would damage or destroy the segment, and require another
segment to rebuild the damaged one in order to continue. Other worm
programs, however, are entirely self-contained. They are also more
traceable, because they reserve the memory that they need to use.
100
CHAPTER F MM How a Hacker Hacks
Recently, on a public bulletin-board system, a discussion about a
very special species of “worm” broke out. During the course of this
discussion, the following story was told by a person who prefers not to
be named. I cannot absolutely guarantee the truth of this story, but I
do know from experience with more benign versions of this program
that the technical principles are valid.
According to this anecdote, which is well known to most hackers,
a computer owned by a very large bank suddenly showed that over
$70 million was missing. During an investigation of the problem, it be¬
came apparent that the money had actually been missing for several
months, and that the embezzlement, if that’s what it was, must have
started as long as four or five years earlier, when the computer was
first installed. The people handling the investigation couldn’t be posi¬
tive, but the only thing they could figure was that an undetected pro¬
gram had been created and set loose in the system in order to take
very small amounts of money from a large number of accounts and/or
deposits and add its “take” to an account or accounts belonging to the
thief. The program must have been designed to cover the missing
money actively by shifting funds wherever needed. Its final act was to
erase itself-an event that triggered the alarms, because the monetary
imbalance was no longer being covered up.
Although there is a slim chance that the story is apocryphal, such
a program — that can roam through a large computer system, gather¬
ing and shifting data (or money) without adding any detectable work¬
load to the system - is indeed possible. Although I have not worked at
this scale, I have seen smaller-scale worms do the same kind of thing
that would need to be done if such an embezzlement scam were to be
accomplished.
The instances of worm programs that I know about were cases in
which groups of hackers used this technique to assign themselves ac¬
counts. But here is an example of one of the true dangers of hacker-
dom: While most of the masters of this technique are not embezzlers,
but rather trespassers who seek nothing more than undetected access
to computing resources, less honest or more malicious people in pos¬
session of the secrets of worm programming could do a great deal of
damage to a system.
(01
OUT 0 f THE INNER CIRCLE
One especially unpleasant aspect of worm-program penetrations
is the fact that nobody ever has to know about them, although their ef¬
fects are quite real. Because the most sophisticated worm programs
are deliberately designed to self-destruct, there are undoubtedly more
examples of successful programs than anyone will ever know about.
By their nature, computer crimes committed via successful worm pro¬
grams are often crimes that go undetected for years, if not forever.
CHAPTER SIX
How Much to Worry
About Security
TLJ
JL JL ow accessible and attractive is your system to hackers?
How much is the information your system contains worth to you and
others? Once you can answer these questions, you will be able to de¬
termine how much trouble and expense you should go to in order to
provide adequate security for your system.
The cost and extent of computer security is really a question of
balance. Several factors (discussed later in this chapter) have to be
weighed against each other. Even banks design their security systems
knowing in advance that these systems can be violated. But rather
than try to make their security one-hundred percent effective, they
try to reach a balance point. Beyond this point, their cost for tighter
security will be higher than if they leave their security as-is and risk
losing some money to robberies. And according to Wisconsin Con¬
gressman F. James Sensenbrenner, Jr., as quoted in a July 25, 1984
Associated Press story, these losses are almost $47 million a year. Still,
unless your security requirements are special (for example, the fiscal
103
OUT OF IH( INNER CIRCLE
COMPUTER
SYSTEMS IN
GENERAL
IS YOUR
SYSTEM EASY
TO CRACK?
responsibilities of a bank or credit union, or the sensitive information
handled by an intelligence agency or the military), you can do very
well for yourself by being ninety percent hacker-proof. By my esti¬
mate, most systems today are only about forty percent hacker-proof.
Computers are becoming increasingly common in the worlds of busi¬
ness and government. They are not yet the mainstay of the “electronic
office,” but wherever you turn, computers are being used more and
more. From micros to supercomputers, these machines are taking on
tasks from processing words to designing bridges and buildings, from
tracking accounts receivable to creating theoretical models of the
birth of the universe.
With so many possible applications and so many different kinds
of computers, it stands to reason that there are many ways in which
computer systems can be set up or used. Everything depends on what
you want to do, how you want to do it, and what you choose to do with
it. In order to understand how easy—or how difficult - any one of this
vast array of potential system configurations might be, we need to
look at the most common ways computer systems are set up, along
with the ways they are accessed, and by whom.
The first thing to evaluate in looking at your security needs is the ac¬
cessibility of your system. Since most hacking is done from a distance,
via modem, companies that find it possible to keep their computers off
the outside phone systems altogether also find that their external se¬
curity problems are at a definite minimum. If, on the other hand, com¬
panies must use one of the large public-access networks (these include
UNINET, Telenet, Tymnet, and Autonet), or if the companies provide
computer access for users via WATS lines (Wide Area Telecommuni¬
cation Service) or 1-800 numbers, 1 would guess they can expect any¬
where from one to one hundred hackers a month to try their luck and
skill on the system involved.
It’s not hard to figure out why, either. Most hackers, like users
who stick to one-letter passwords or system operators who maintain
104
CHAPTER SIX How Much fe Worry About Ucmtf
lax security precautions, are lazy. They never bother to try systems
they don’t “stumble” upon. So, simply place yourself in the hacker’s
shoes and ask yourself how much trouble it would be for an outsider to
find your system. A few hackers will try to locate computers through
contacts within the phone company or within the computer-owning
company itself, but most of them by far will be content to be kept busy
by the many computers that seem to throw themselves out at hackers.
Of course, many companies need to make their computers easy
to find in order to give their users as much flexibility as possible to call
in. Perhaps these companies have many offices across the country, or
their employees need frequent access to company files, or, as an ex¬
treme example, they may be companies whose business is selling or
leasing computer time. In these cases, accessibility is an understand¬
able necessity, but it’s important to realize that this accessibility is
achieved at a cost: privacy. Other companies, those that do not need
this kind of public presence, have much higher levels of security, sim¬
ply because they are more difficult to find and call.
In addition to phone access, you must also consider the terminals in
the company buildings. Terminals are direct lines to your computer.
And the more terminals you have, the easier it is for a hacker to use
them without being noticed. By this, I mean something as simple and
audacious as entering the building and sitting down at a vacant termi¬
nal. Hackers don’t always hack by modem, anonymously and in the
middle of the night. A hacker can, in some cases, spend hours at a ter¬
minal in some back office of a large company without being noticed.
Or, perhaps, he can work in an office where the employee is out.
In other cases, the hacker may be able to use an account if a legiti¬
mate user hasn’t logged off yet.... Suppose Jack Smith is a legitimate
user. He decides to check his electronic mail before he leaves for the
day, so he logs onto the company computer. After reading his mail,
he rushes out the door so that he won’t be late for his weekly poker
game — forgetting to log off in his haste. Later that evening, a hacker
walks in with the night shift. He finds Jack’s “open” terminal and uses
Jack’s account as an entry into the company’s system. To the com¬
puter, the hacker and Jack Smith are one and the same person.
Access from Within
105
0 U T OF THE INNER CIRCLE
Number of Users
Preposterous? A hacker’s tale? No. The fact is, I know this can be
done; several of my friends have done it-and I have done it myself.
More interesting than my story, however, is one I heard from a
friend who went into a large office building with the intention of using
the pay phone. When he got there he thought, “Why use a pay phone?
I’m sure there are hundreds of phones upstairs I can use. And they
won’t cost me anything.” As he expected, he found that most of the
people were out to lunch and none of those who were in the building
paid any attention to him. He finally found a phone that he thought he
could use, and there, next to it, was a glowing terminal. He looked at
the terminal and saw that an account was active on it. After playing
around a little, he found that this account had quite a bit of power. He
used this account to set up another one and to find out the phone
number of the system. Once he got home to his own terminal, he had
his very own account.
And what about the number of people who use your computer every
day? As a general rule, the more users you have, the easier it is for a
hacker to gain access to your system. One reason for this is that inside
information is much easier to obtain if many people use the system.
With the hacker population growing at such a rapid rate, it is fast
becoming more likely that a user on a typical system knows, or knows
of, someone who is a hacker. A second, perhaps more important, rea¬
son that having a lot of users will help hackers is that, as I’ve men¬
tioned, users are the weakest link in the security chain. More users
mean more weak links, and more weak links mean greater chances for
a hacker’s success. The MegaCar main computer described at the be¬
ginning of this book is a good example of both these factors.
I used MegaCar’s research computer, a VAX, to show you a sim¬
plified example of what hacking is like. This special-purpose VAX
would not see many users in a typical day, but the main computer of
such a company might get at least a hundred and fifty different users
every day. Let’s assume (for the sake of argument) that one of the
many people authorized to use this very busy computer knew some¬
one who knew someone who had a brother who was a hacker. Let’s
also assume that this person allows - either intentionally or through
106
CHAPTER SEX How Much to Worry About Security
carelessness - his friend’s friend’s brother to get hold of the informa¬
tion required to use the computer.
Now a hacker has the information, which became available in the
first place because of the large number of users with access to Mega-
Car’s computer. What would happen if that one hacker started playing
around with the system? And what would happen if he gave the access
information to twenty of his cohorts? The operators would have a hard
time spotting the activities of these hackers, with a hundred and fifty
people logging in and out of the computer all the time. But twenty-one
unknown snoops, with no compunction to keep MegaCar’s access in¬
formation private, would be free to go their merry ways.
By now, you may have a pretty good idea of the accessibility of your
system. Keep that in mind as you go on to examine your system’s at¬
tractiveness, or “value,” to an average hacker. Since a hacker has liter¬
ally tens of thousands of systems to choose from, he is not likely to
spend too much time on a system in which he doesn’t have any inter¬
est. It’s quite difficult to evaluate the attractiveness of your system, be¬
cause of the wide range of possible motives hackers might have, but
many systems seem to appeal needlessly to all hackers, and this can,
and should, be avoided. The following descriptions will give you an
idea of systems that seem to attract a lot of hackers.
Systems with many users. Let’s assume that Solid State has run
across four different systems today. He wants to spend a few hours
trying to get onto one of them, and of course he wants the best possi¬
ble chance of succeeding in this limited time. If one of these four new
systems has an unusually large number of users, he will spend his time
on that one.
Solid State may be able to find the number of users on the system
from the welcome message, or from the way the system acts when he
calls it. Or, the system may accept limited commands before he is
logged on—commands that will allow him to get this information.
Systems that handle hundreds or thousands of users every day
are vulnerable systems, and very likely to attract hackers. One of the
major reasons for this, as I mentioned earlier, is the fact that users are
IS YOUR
SYSTEM
ATTRACTIVE
TO HACKERS?
107
D U I OF THE INNER CIRCLE
the weakest link in most computer systems’ security, and the added
users provide more weak links. Another aspect of these systems that
makes them attractive to hackers is the fact that their operators are
busy and don’t have nearly as much time to worry about security as
the sysops on less congested machines.
We}}-known companies. Slasher the Crasher is calling systems. He
spies a computer owned by a “household name,” and his mouth starts
to water right away. You recall we compared Crashers with vandals;
both want to earn as much “fame” as possible, and Slasher the Crasher
would gladly choose the well-known company over a possibly more
valuable system that belongs to a company no one has heard of.
Systems belonging to well-known companies will attract not only
Crashers, but more than their share of other hackers, too. Some of the
hackers will choose well-known companies because they feel they are
achieving more than they would by getting into equally complex com¬
puters belonging to less famous organizations. Others hope to gain
publicity among other hackers, or they wish to see the files of these
corporations and learn about what goes on in them. But most hackers
are drawn to well-known companies only because large companies
have large computers. And then, of course, there are the competing
companies, which have their own motives-motives, such as piracy, or
“sneaking a peek," that really are outside the scope of this book.
In addition, one of the first things novice hackers do is try to get
onto the systems of the largest companies they can find. Novices
shouldn’t concern most companies yet, because these hackers, at their
level of experience, just don’t have much of a chance of getting into a
reasonably secure system. Once their numbers grow, however, the
volume of their attempts alone could be a big problem, even if none of
the hackers gets in: The phone lines will always be busy and the com¬
puter workload will be wasted on checking passwords.
Service computers. When ProHacker wants to play a game, get
stock market results, or talk to other users interested in TRS-80s, no
computer will allow him to do all of these things better than a com¬
puter that exists only to provide such services. This computer proba¬
bly also qualifies as a system with a large number of users, and as a
system owned by a large company.
I0S
CHAPTER S I X How Much to Worry About Security
Many hackers who try to get into these service computers are
simply trying to get the service for free, but there are rumors that a
few could be out to resell computer time - most likely by selling, for
a one-time fee, accounts and passwords that would last a few weeks
or so until the operators found and removed them. Service computers
are usually large systems, so by their nature, and because they are
both well known and accessible, they automatically tend to attract a
large number of hackers.
Hacker-friendly systems. After a long day of exploring computers
that are totally unknown to him, a hacker likes to spend some time on
a computer where the people running it welcome him. Some system
operators and programmers talk to hackers on a daily basis; hackers
find this quite refreshing, and probably more interesting than do the
people running the system.
Systems that are known to have operators who are friendly to¬
ward hackers naturally attract hackers. The hackers learn about them
through private hacker bulletin boards, and usually use these systems
to talk to one another (as well as to the system operator), because they
don’t need to fear giving themselves away. On the surface, hacker-
friendly systems may sound like a contradiction in terms, but they are
surprisingly common.
University computers — the ones used by students, faculty, and
the administration—quite often qualify for this category, because they
are usually not used for anything that seriously needs security equip¬
ment. While the university administrators may not like the idea of
hackers using the computer without proper authorization, the system
operators are the only people who know who has authorization and
who doesn’t-and they are often students themselves. One university
computer I was quite fond of had a system operator who would allow
us to hack all we wanted. When we ran into trouble getting onto the
system, we could just ask him and he would even give us the password
to one of the professors’ accounts.
“Easy” systems. Systems that are known to have security prob¬
lems are quite popular with hackers, for reasons that must be obvious
by now. Hackers normally keep in touch with one another about such
easy systems to crack. Some are easy because the operators neglect
109
OUT OF THE INKER CIRCLE
basic security precautions; others are easy because the operating sys¬
tem is old and simply not as secure as the newer versions. But re¬
gardless of the reason, once such a system is discovered by one hacker,
you can be sure that the word will get around to many more.
Systems on a network. Other than the services they provide, an
important difference exists between a privately owned computer that
is accessed via one or a few public telephone lines and a more “uni¬
versal” computer that is one of several on a dial-up network. Both
types of computers respond to phone calls, and both types can be ex¬
plored by a hacker with a modem. The big difference is, the privately
owned computer has a limited (and known) group of users and its
phone numbers are not very widely known. A computer on a network,
on the other hand, has a much larger group of users (think of THE
SOURCE, for example) and there is no limit to the number of people
who know the phone number needed to access it.
As I’ve mentioned throughout this book, systems on large public
networks are likely to get a lot of hacker activity. Hackers can almost
always call the network easily toll-free, and the chance of being traced
through the network is very slim, if the hacker knows what he is doing.
Networks have been described in various ways by hackers, but I
think the best description came from a hacker known as The Wizard
of ARPANET, who said, sometime in early 1982, “Networks are a
hacker’s fantasy.” Of course, at that time, networks provided hackers
with a real dreamworld: thousands of computers, accessible by phone,
that had no better security, and thus were no more difficult to access,
than any other computer. But now, since the number of hackers is
growing so fast, the security of most systems on networks gets a
healthy test as soon as the computer is put on the network.
In fact, network computers are often more secure than many pri¬
vately owned computers with phone links, just because more hackers
quickly find and test the network’s defenses. These days, hackers more
often spend their time “scanning” phone numbers, hoping to find a
private computer, than they do searching for a way through the tighter
security barriers of a well-guarded network system. As I said, hackers
are lazy (at least at this level of hacking) and would just as soon bump
into an easily breached system.
110
CHAPTER SIX How Much to Worry About Security
All this, however, doesn’t mean to say that the owner or user of a
network computer has no security worries at all. There are still a lot of
hackers trying a lot of different computers, and some hackers are very
good and very dedicated (remember the Tourist?). Some hackers are
bound to get on some networks, and once they are there, it sometimes
happens that the hacker doesn’t have to be anything but persistent and
likable to go farther.... For example:
Sometimes, when exploring on a network, a hacker will come
across an address (a remote computer) that seems dead. No matter
what he types, the distant machine just sits there. Quite often, how¬
ever, when this happens, the hacker can type in HELLO???, enter a
few Control-Gs (the character that makes a bell ring on the terminal at
the other end), and someone will reply. If this happens, the other per¬
son is almost always someone in a computer room, and depending on
who that person is, and where his sympathies lie, the hacker can some¬
times talk him into helping out with an account or a password. In this
case, hacking is a lot like walking up and ringing a doorbell. If this can
happen on your system, make sure your sysops know how to say “No.”
No one wants to give away free computer time, but is security really
worth $5000, plus $350 a user? Or $12,000, plus $600 a user? In the
vast majority of cases, the answer is no. Despite all the recent quantum
leaps in technology, we are not yet out of the ink-and-paper age. Com¬
puters are still an adjunct, and computer information is usually backed
up several times, in more than one medium, for safekeeping. In terms
of potential destruction of data, this backup process simply means that
computers do not justify security as a major expense. If you want to
keep your system safe from Crashers or bungling amateur hackers, I
think that rather than spending a large amount of money on security,
you could probably do much better by educating your users on keep¬
ing personal accounts secure.
On the other hand, suppose your concerns are with the security
of confidential information, or as I mentioned at the beginning of this
chapter, finances - computer information that represents actual dol¬
lars that belong to someone. In this case, you not only need to back up
THE
SECURITY
BALANCE
111
D U I OF THE INKER CIRCLE
the information for historical purposes, you need to keep outsiders
from seeing the contents of your files. You really may need to consider
going to some expense to protect your system.
The security balance, as i described for banks, is a seesaw - a
tradeoff - between the expense of tightening your security and the
estimated expense of your potential losses if you leave your security at
a lower level. When the cost of your security exceeds your losses, it’s
time to sit back and re-evaluate what you want and what you need.
You don’t need a cannon to protect your home, and you don’t need 007
security tactics to protect your accounts receivable. What you do need
is to figure out the value of your data on your system: Just how much
are all those numbers and letters that go through your computer every
day worth to you, and to others?
Here is a list of questions to consider in evaluating your own situ¬
ation and your own security requirements:
How secret is the information that is kept or managed on the sys¬
tem? Would the data, although it may not mean that much to you, be of
use to a competitor? Some information can be very valuable to a com¬
peting company.
In a case reported by security expert Donn Parker, there were
two companies that would bid against each other on various projects.
The company with the lowest bid got the job. During a period of sev¬
eral months, one of the companies underbid the other one-hundred
percent of the time - there was only a very slight chance this could
ever happen out of sheer coincidence.
Eventually, it was discovered that the “winning” company had
access to the other company’s computer system. It was able to find out
how much the “losing” company was planning to bid on all its projects,
and could then plan to underbid by a very small amount.
How “solid” are these numbers on the computer? Do you back up
your data well? Do you have time to check online data against backed-
up data often? Or do you take what the computer says for granted? If
you can’t easily spot hacker-changed data, then you may be working
with incorrect figures and not even know it. Certain credit bureaus
may operate for years without checking computer data against any¬
thing in the “real world,” for instance.
112
CHAPTER SIX How Much h Worry About Security
Or suppose the numbers on your computer system change by the
hour - perhaps you list the current stock market prices for the top 100
stocks and update them every hour. If the information is to be updated
in ten minutes, and you need to know the price of one of the stocks
now, you will take the word of the computer. After all, the computer
exists to let you know the most current price, and if you had to verify
the price by calling New York why use the computer? Since you take
the numbers coming from this system for granted, you should spend
effort in making sure your security keeps them correct.
What is the dollar value of the data to the public? Could you charge
S250 an hour to access your data base? If you could - if your informa¬
tion is that valuable and that much in demand — and if your security is
not high enough, perhaps someone is charging the public $250 an
hour.... Check the accounts and activity on your system.
DIALOG, for example, is a very large computer database service
owned by Lockheed. At one time, the data bases incorporated into
DIALOG were separate and privately owned, but the owning com¬
panies decided to charge outside users for access to their data bases.
Some now cost the public in the hundreds of dollars an hour to access.
Any information is worth something. And if it’s marketable, it may be
worth quite a lot.
How much weight should you give to the time that hackers may
spend on your system? Computer time itself is worth money. It is up to
you to determine just how much your system’s time is worth, not only
in terms of offsetting the cost of equipment and operating expenses,
but also in terms of productivity. For example, I know of a hacker who
once accidentally started a batch process that ended up costing tens of
thousands of dollars in computer time before it was through. Oops.
How much computer time do you need? If you are pushing the
limits of your system already (and many companies are), then you
can’t afford to allow several hackers the chance to move around un¬
noticed. If nothing else, they will probably demand more time than an
average user, because they search the disks so much. Then, too, if
Hammer decides to set up a hacker’s bulletin-board system on your
mainframe, and seventy people call every day, they can be quite a
strain on your system. If your system is finding it tough enough to deal
(13
OUT OF THE INNER CIRCLE
with authorized users, you don’t need to donate twenty-five percent of
its time to the “hacker’s cause.”
How much is your computer worth ? Some computer time sells for
hundreds of dollars a minute. If you have a fast or otherwise advanced
computer, then you need to protect its time. Once again, if you don’t,
some invisible entrepreneur may do it for you. Just as a general scale
of measurement, try to decide what the cost of your computer time
would be if you were to sell it to the public. In some cases, two or three
dollars an hour would be too much, while in others, two or three dol¬
lars a minute would be very cheap. If just a few minutes a day adds up
to quite a bit of money, it may be worth a little extra expense to ensure
that hackers stay off your system.
Does your system control any external devices? While this ques¬
tion applies to a specialized group of people, there are some com¬
puters responsible for controlling such devices as phone services and
printing presses. Damage or misuse of such devices compounds the
expense and headaches associated with abuse of the computer alone,
so these systems usually have to have the best security possible. The
program “60 Minutes” did a story some years ago, about a group of
kids who found some information on a telephone-company computer
system and ended up with the power to shut off phone service to mil¬
lions of Los Angeles residents. That computer system should never
have been on the phone lines.
USE YOUR
SYSTEM TO
DISCOURAGE
HACKERS
It is always best to prevent a hacker from ever intruding on your sys¬
tem in the first place. If you remove him after he has been on for a
number of hours or days, he has had a good chance to look at your se¬
curity from the inside, to acquire plenty of account names, and (if he’s
a high-level hacker) to set up some type of logic bomb or Trojan horse.
As you saw in Chapter Five, these tricks are designed either to help
the hacker or to harm the system after he has been thrown off your
computer. Sometimes, long after.
It could be that, by now, you’ve decided your system security is
adequate for your current needs. On the other hand, you may feel you
need some extra security, but of course that’s going to take a little
ft4
CHAPTEB SIX How Much to Worry About Security
time. In either situation, you’re still interested in keeping hackers off
your system now. If a hacker manages to gain access to your system,
how can you discourage him?
In many cases where system security is not a high priority, the
operator tries to handle some security operations manually. It is al¬
most always all right for the operator to hang up on a hacker manually
(the hacker assumes the system is doing so). But no matter whether the
operator or the system can hang up on the hacker, it is often a mistake
for an operator to break in and try to talk to him.
Suppose the hacker tries ten or twelve passwords to an account,
and then the system operator breaks in to say something like “Go
away,” “What do you want with this system?” or “I’ve just traced your
number. The FBI is on the way.” In a few cases, this move will be suc¬
cessful but, in most situations, these confrontations will only incite the
hacker to bigger and better efforts. If the hacker doesn’t decide to
leave, he may consider the operator’s words as a personal challenge.
Now, you may well be asking yourself, “Why should I care if a
hacker thinks he’s been challenged?” Because hackers have one thing
going for them that should make you care: a very quick and easy mode
of communication. Here is an example of what can happen if they de¬
cide to use this advantage.
A hacker calls ZZXY’s computer and casually tries a few level-
one things off the top of his head. Then, for some reason, he decides to
keep trying at this computer - perhaps he likes the way the system
“looks,” or he thinks the security will be lax. Soon after he gets inter¬
ested in the system, an operator breaks in and tells the hacker to leave
the system alone. As I said, at this point many hackers would leave the
system, thinking that the security here must be fairly high if an oper¬
ator has time to be catching and talking to hackers. But bear in mind
that many hackers are competitive (at least on their own “turf”) and
are quite likely to think of hacking as something of a game, like chess.
So, let’s assume this hacker decides he must get into the system, to
“beat” the operator. This attitude surfaces quite often, and presents
you with two dangers:
First, the hacker will spend more effort on the system; he is no
longer thinking, “It would be nice to get into that system.” Now he is
OUT OF T H £ J N N F R CIRCLE
A SECURITY
CHECKLIST
thinking, u l must get into that system.” And because he wants to beat
the operator, he is also likely to enter the system in a way that won't be
so easily detected, because he knows he is under observation.
But the second danger is the more serious of the two. The hacker
may decide to start using various computer bulletin-board systems
across the country to communicate with other hackers. He will ask
many different hackers for help in breaking into your system.
To illustrate the consequences of this second problem, here's one
case that I know of. A hacker had gained access to a computer. The sys¬
tem operator broke in and told the hacker that his number had been
traced and he was to leave right away, or the police would be called.
The hacker agreed to go, but said that, unless the system operator
could prove that he had traced the hacker's number, he would come
back later. The hacker knew that phone numbers must be traced with
the help of the phone company, and that the process takes time and ad¬
vance preparation. The sysop was almost certainly bluffing, so the
hacker wanted the operator either to type his phone number or name
over the computer, or to send the police within a few days.
Of course the system operator had not traced the number, so the
hacker called back. But the next time, he had friends with him. Over a
hundred of them. I think that this company had to get rid of its modem
lines because of this.
I should mention here that most systems in use today should be con¬
sidered quite secure and would be if they were run as they were de¬
signed to be run. Security is easier to neglect on some systems than it
is on others, but most systems have many passive security tools that
the users are free to use — or to ignore.
Certain systems have little quirks or tendencies that may make
life easier for a hacker, but the real responsibility for security belongs
to the users and the operators. A system may enable a hacker to see
who is logged on before he starts hacking, but it is the users who
choose passwords that the hacker finds so easy to guess. A system may
make it easy to go with certain well-known defaults, but it is the sys¬
tem operator or programmer who decides to use them. Just as people
116
CHAPTER SIX How Much to Worry About Security
may go out at night, leaving doors or windows open in their houses,
users and operators may neglect system security.
But, as you can see, threat or nuisance, vandals or pranksters,
hackers can cause headaches if they gain access to your system. Even
if you don’t handle huge amounts of money or process top-secret data,
your system could still attract hackers-most particularly if it’s easy to
access or if it’s a state-of-the-art machine, the kind that hackers espe¬
cially like to find. It’s important to evaluate what you’ve got and what
you need, so in light of the preceding discussions, here is a security
checklist covering the most popular operating systems. This informa¬
tion is not based on any research study or statistical analysis. It’s based
on my own experiences as a hacker and on my conversations with
other hackers, system operators, and system programmers. It’s a
hacker’s impressions of system security. You might say it’s the view
from the other side of the modem.
Among computer companies and computer professionals who are
knowledgeable about operating systems, the term UNIX is generally
used to refer to a number of different versions of a very popular oper¬
ating environment. The name UNIX itself is a trademark of Bell Labs,
which developed the original operating system in the late ’70s. Today,
however, there is UNIX itself, a number of modified, licensed versions
of UNIX, and various UNIX-like operating systems that have been
developed independently. In addition, because the program code in
the early versions of Bell’s own UNIX could be - and was - tailored to
each purchaser’s own system requirements, there are many unique,
“homemade” variations of UNIX, as well - variations that may no
longer have the original version’s security safeguards. And all these
different “UNIXES” run on just about any computer system... from a
$2000 personal computer to a $700,000 IBM system.
With this operating system, it is hard to pinpoint any particular
hacker “loopholes,” just because so many versions exist. But here are a
few common approaches:
On some versions it is possible to execute a WHO-type command
at the log-on prompt. This command gives a list of the user names
logged on at the time, and within certain limits tells what the users are
UNIX
117
OUr OF r H £ INNER CIRCLE
TOPS and RSTS
doing. In some situations, it is helpful for an actual user to find out how
many people are logged on before he or she logs on, but this informa¬
tion can also needlessly encourage the hacker by giving him account
names and by telling him how large your system is and what type of
work is done.
A user on a UNIX system is generally either a user or what is
called a superuser. A user’s power is essentially limited to his own file
space and public access areas, while a superuser is somewhat akin to
a sysop. In most UNIX systems, a “normal account” turns itself into a
superuser’s account by a single, password-protected command: Type
something like SU (for superuser) and the system asks for a password.
This could mean trouble because many different people are likely to
have this password, and if reasonable security is not kept, it probably
has a much greater chance of getting out than a normal sysop’s ac¬
count, which would be known only to perhaps two or three people.
As a general rule, UNIX-like systems are designed to keep pro¬
grammers happy, and this, in many cases, keeps hackers happy too.
While they may not always be vulnerable, UNIX systems are desirable
and have been the favorite target of hackers who like to get things
done by writing programs (such as Trojan horses or rapid-fire tech¬
niques) or generally just finding a new way to do things altogether.
The passwords in the UNIX system are kept open to every
user... but in encrypted form. It is almost certainly beyond hope for
anyone to try to decrypt a password, especially since the hacker must
already have one account on the system. However “almost certainly”
is not one-hundred percent. There have been a few attacks made on
this system of keeping passwords, so you should keep this fact in mind.
TOPS and RSTS are operating systems designed to run on certain DEC
minis and mainframes. A more user-friendly system than many, this
type of system is often the target of new hackers, because it is gener¬
ally quite helpful. Here are a few features that hackers use:
These systems are famous for allowing limited commands before
a person is logged on. The commands usually allow a user to check
who is logged on, and they sometimes allow a user to send messages or
even mail of some type. Hackers can get lists of account names and can
tt8
CHAPIEfl SIX How Much to Worry About Security
even talk to the users in hope of finding some unsuspecting someone
who will give away his or her account.
This system usually uses what’s called a PPN as an account name.
In practice, this means that account names are two numbers separated
by a comma - such as 100,104. This feature is not actually a security
problem in itself, but it is worth mentioning, because quite often num¬
bers such as 100,100 or 400,400 are set up as demonstration or open
accounts, and hackers try these, just as they try DEMO on systems that
use words as account names.
VMS is an operating system designed to run on a VAX computer,
which is made by DEC. VMS is perhaps one of the most user-friendly
systems available. Hackers also consider it one of the more secure. No
commands are allowed before log on and, as far as I know, there aren’t
any built-in defaults a hacker can exploit. The inner-system of security
also makes it easy to set up a “secure” system.
When a hacker runs across a VMS machine, he knows it because
the log-on prompt is USERNAME:. To confirm his assumption he will
probably bit Control-Y. If he needs further proof, he will enter a false
user name with a /XXXX on the end, and then the same false user
name with a /COMM = XXXX on the end. A VMS machine should give
an error for the first entry, and allow the second.
Once he establishes that this is a VMS machine, the hacker is
pretty much on his own. He will try many things, such as DEMO and
GAMES, because a surprising number of VMS machines seem to have
these accounts. The system also makes it easy to default the password
to “same as user name,” so hackers will often try that, too. Last,
though I have never been able to confirm this, I have been told that on
VMS there is a sequence of characters (Control and otherwise) that
would allow anyone to access a maintenance mode that is quite power¬
ful. Fact or fiction? I don’t know.
Once a hacker is on a VMS machine, however, he finds this oper¬
ating system very user friendly. And because it is, it is also one that is
quite often used by people who are not interested in computers. The
overall effect is that security may actually be weak, because the users
are less interested in security.
VMS
119
OUT OF THE INNER CIRCLE
Primos Primos is the operating system that runs on the Prime series of super¬
mini and mainframe computers, of which the Prime 750 is the largest.
In the past five years, Primos has moved from being one of the most
non-secure systems to being probably one of the top five in security.
Many (if not most) companies, however, still run the older versions of
Primos, and many smaller businesses are buying used systems. Here
are a few possible problems:
The earlier versions of Primos had no password system at all. A
user would cal! the system and enter LOGIN <USERNAME> and
would be in the system just that easily. If a hacker were to try LOGIN
JOE and Joe were not a valid user name, the system would simply
tell the hacker to try again. In one case I remember, the user names
were actually that easy: On about my fifth try, I entered LOGIN
STEVE, and this was a valid user name. Once I was on the system, I
easily found all the other user names, too.
For these same versions of Primos, third-party companies wrote
password-protection programs for the owners of Prime systems. I am
sure quite a few of them are very good, but the ones that I ran across
were very sloppy and easily outwitted. As you can see, such inade¬
quate protection can lead to a false sense of security.
There was one instance in which the old Primos did require a
password. The problem was, this password defaulted to XXXXXX (six
Xs) and was very rarely changed.
All but the newest version of Primos have certain default ac¬
counts, the most famous being FAM, DOS, and SYSTEM. This means
that if the system is left as-is, after it is installed by the company, some¬
one need only enter LOGIN FAM, LOGIN DOS, or LOGIN SYSTEM to
be admitted to the system.
The newest version of Primos - revision 19 - is quite secure as far
as I know, and any hacker would probably need to resort to some of
the techniques discussed in Chapter Five in order to get anywhere. As
I said, however, there are still quite a few earlier versions of these ma¬
chines available to a hacker.
VM-370 VM-370 is an operating system that usually runs on an IBM-370. In
most cases, VM-370 is not nearly as friendly to hackers as many other
120
CHAPTER SIX How Much to Worry About Security
systems, so hackers don’t know much about it relative to some others.
Not that they couldn’t get the user manuals ... or call IBM and ask for
technical help. It’s just that they find it is so much easier to use one of
the systems that offer a bit more help on demand.
I was told by a friend who was more informed than I that, once
inside a VM-370 system, a hacker finds the system, like VMS, is quite
user friendly. According to him, the difference between the DEC and
IBM systems in terms of hacker-related security probably comes from
one major feature: The owners of DEC machines, he believes, are en¬
couraged more to use networks because of DECnet, a system of net¬
working various DEC machines, both together and to public networks.
And, as you know, hackers love networks, because a call to one com¬
puter enables them to access many.
IBM systems are also capable of such networking but, the com¬
pany itself seems to lean more toward keeping the systems indepen¬
dent and off the networks. This tendency can be either good or bad,
depending on how you look at it but, from a security aspect, it is good,
because the hacker’s world as a whole does not contact IBM systems
nearly as much as it contacts other systems.
CHAPTER SEVEN
Make the Most of What
You’ve Got
m before you go spending huge amounts of money on external
security devices, why not learn the best use of all those simple, yet
effective, security features that are built into most systems? If prop¬
erly used, almost any system has the ability to stop almost any
hacker’s best efforts.
In my experience, the most effective security systems have been
the ones that used multiple lines of defense - at least two methods in
conjunction. Even if you have, or are considering, the best and bright¬
est of hacker-proof security devices, it’s my belief that one awesome,
perfect, unfailing device cannot substitute for the combination of two
or three less wonderful methods. Even if you have a state-of-the-art
callback modem (which verifies a user’s authorization before con¬
necting him or her with the system), you still don’t have an excuse for
sloppy password security. Even if you use encryption to make your
data unreadable, you’ll be safer yet if you also have an unlisted, well-
hidden telephone number.
123
OUT OF T M t INNER CIRCLE
A FALSE SENSE
OF SECURITY
Hackers love to find a company that claims no hacker will ever see the
inside of its system. In a few cases, such a claim will only serve to
motivate the hacker. More often, though, and more importantly, such
a claim advertises to high-level hackers that the system in question has
only one line of defense-one security barrier on which the company
depends completely.
Even if the claim is simply the unspoken belief of the company
involved, too much reliance is still placed on a single precaution. All
too often, the company with “the ultimate security system” doesn’t
believe that it needs to bother with all those other silly security pre¬
cautions - such as secure passwords and detailed user logs. That’s a
mistake. As the saying goes, “don’t put all your eggs in one basket.”
Once, I remember, there was one company that thought it had
cornered the market in security. It had a nice little computer system
and allowed access to it on only one unlisted telephone line. Presum¬
ably, if no one knows you have a computer system on an unlisted
phone line, then who can find out about it? Especially if you are sure
that no one in the company is going to give out the number - so this
company thought, anyway, and with some justification. But, because
the company never expected an unauthorized user to find the com¬
puter-even by accident - there was essentially no security other than
that well-hidden phone number.
One day, however, an employee stumbled upon a file created by
hackers several months earlier. All told, five hackers had used this
system freely for about a year before they were discovered. They had
done the system no harm, but if a crasher had discovered that com¬
puter, he could easily have destroyed hundreds of hours of labor.
At the other end of the scale, I know of a very large system that
needed to use a very busy network. Taking the advice of a well-paid
consultant, the owners equipped the system with a state-of-the-art
device for coding and decoding data (cost of device and the consultant
together, more than $270,000). The device on this system required
each user to use a special terminal capable of performing the neces¬
sary scrambling and unscrambling of data, and these terminals were
supplied only to authorized users. On the surface, this would probably
look like a very secure system. It was, but not unconquerable.
124
( H 1 P I E a SEVEN Make Ike Most ol Wkal You're Got
A little help from the inside (not hard to get from such a large
company) and a little programming skill allowed a hacker to use his
personal computer as one of these terminals. After that bit of work,
the rest of the system became an open book, because no one in the
company could imagine that this expensive and sophisticated security
device might be circumvented. Once again, the security was very lax
once the single existing barrier was overcome.
The preceding example told of an instance in which a hacker received
help from within the company whose computer he was seeking to ac¬
cess. Perhaps you are thinking, “Oh well, that was just a stroke of luck
for the hacker.” No, it wasn’t. In fact, when I was recently asked, “How
do hackers go about getting inside help from a large company?” my
first reaction was to call that a silly question. But then I realized that if
one person didn’t know, there must be others who don’t know either.
The larger a company is, the easier it is for a hacker to get inside
help. The hacker’s first advantage is that employees of a multibillion-
dollar corporation quite often do not consider such a huge organiza¬
tion “real.” The employees of such a company may charge personal,
long-distance phone calls to the company, or they may take home pens,
pencils, paper, and other supplies. If they don’t, are they honest be¬
cause of fear? Or because of respect for the company in question? The
issue of employee involvement is obviously far beyond the scope of
this book, but the fact remains: People who feel a sense of commit¬
ment and responsibility are far less likely to become security risks
than people who see their employer as the source of a paycheck and
not much more.
A secondary reason that inside help can be easy for a hacker to
get in large companies is the simple fact that there are more people for
him to try. In most cases, a hacker doesn’t have any contacts in the
company, but he will probably only have to talk to a few people before
finding help. By “a few people,” I mean, usually, one or two. As you
can see, the odds are strongly in the hacker’s favor.
Hackers (or anyone else) can, if they need to, quite easily obtain a
company phone book from almost any large corporation. As another
THE HUMAN
FACTOR
1ZS
OUT Of THE INKER CIRCLE
example, assume that you work for MegaComputer, Inc., and some¬
one calls you at your office and asks you to read a four-digit number off
a thick gray wire coming out of the wall next to your desk. He tells you
that he is from the company’s maintenance department. Or maybe he
even takes a bolder approach and assures you that he is only a kid out
for fun-no harm or vandalism intended-after all, wouldn’t a criminal
just break in and read the number himself? If this scenario seems un¬
likely, or you’re sure you wouldn’t fall for a “mischievous-kid” story,
why not stop and think a moment about all the times you’re in a hurry
or your mind is on something else_Remember, the helper isn’t nec¬
essarily willing in the sense of “aiding and abetting” Ignorance and
carelessness can serve a hacker just as well.
Educating The question of developing security consciousness among users is
Users much harder to resolve than the problem of developing security guide¬
lines for your system. How can you get users to watch out for their own
accounts if they only log on once a month and don’t really care about
the system one way or the other? Users need to know how they can
help and, more importantly, why they should help. If they don’t, or if
they don’t care, they will just be easy targets for hackers.
Computer users need the education that will allow them to use
security systems the way they were meant to be used. They need to be
able to spot any hacker activity on their accounts; they need to know
what to do or whom to call when they suspect hacker activity; and
they need to be aware enough of security not to give their account and
password to anyone-not to anyone in the company, and definitely not
to that youngish-looking technician who says he’s from IBM. Com¬
puter owners and system operators should take the time and effort to
educate their users. If they did, hacking as it is today would fall to such
a low level of activity it could be considered dead. It’s that simple.
Failing the possibility of in-house user education, this subject is
important enough to some companies to justify the cost of sending
users to a series of classes or seminars, or of bringing in an expert to
conduct a special session on computer security. Most companies would
probably get back their investment within half a year or so.., and a
few would profit greatly for not having lost.
126
C H A P I E R SEVEN Make the Most ot Whal You've 6ol
Whether you choose to educate your users yourself, send them
to classes, or bring in an expert, another good idea is to work out a sys¬
tem of assigning passwords after the user finishes the security course.
As a final exam, the user can pick his or her own secure password.
But, no matter how you decide the question of educating your
users, you should consider having the system itself throw out periodic
reminders and suggestions on security: “Hello, John Smith. It’s been
over fifteen months since you changed your password. Don’t you
think it’s about time?” or, simply, “Remember, a secure system helps
us provide you with a secure job.”
As you’ve seen throughout this book, hackers and users must both use
a common route to gain access to a computer system: They must ei¬
ther use a terminal that is directly connected to the computer, or they
must call in through a modem. Once they’ve obtained access to the
system, they must then log on with accounts and passwords to be able
to do any kind of work with the system.
There are different ways you can protect your system at these
access points. Some are specific to terminals, some are specific to
modems and phone lines, and some are general techniques that apply
to both hard-wired terminals and to remote communications devices.
As I mentioned in Chapter Six, hackers are very fond of getting
the maximum amount of fun from the minimum amount of effort.
Almost all hackers, almost all of the time, prefer to take what systems
are dangled in front of their noses. Make it difficult for hackers to
stumble across, or use, your system “without really trying,” and you
will be well on your way to much tighter security.
Your first security measure, then, is inaccessibility.
It’s not a good idea to have a terminal in every office and several more
in the lobby or in back rooms. Having a terminal in every office makes
it easy, but not many hackers are really going to want to go into some¬
one’s office. When you add extra terminals in the halls or in unused
rooms, however, it’s like saying to a hacker, “We’ve got more terminals
than we need; feel free to sit and use that one for a few hours or so.”
THE SYSTEM
ITSELF
Terminals
127
OUT OF THE INNER CIRCLE
Phone Lines
And Modems
Ail those terminals may make life easier for you, but they also mean
that the users-to-terminals ratio is low, and this makes it all the easier
for a hacker to find a terminal that no one uses regularly.
You also want to make sure that the system checks for activity
from users. If a terminal gets no activity for more than ten minutes or
so, it should be logged out automatically* If this is not done, you are go¬
ing to have people leaving for lunch or possibly for the weekend and
leaving their accounts active on their terminals. A hacker would only
need to sit at the terminal to read the user's mail and/or to get an inside
look at your system.
Whether or not you have terminals scattered about the offices in your
company, if you also allow phone access to your computer system, you
have another set of security problems to contend with. The “classic 1 ’
hacker these days seems to be an upper-middle-class teenager locked
in his bedroom in the middle of the night, manipulating the system of
some corporate or governmental giant thousands of miles away. Well,
the portrait is somewhat exaggerated, but it is true in the sense that
most hacking is done at night (when loads on the systems are lighter)
and it is almost always done by phone.
If you must keep your system on the phone lines for some reason,
here are a few things to keep in mind.
See if it is possible to eliminate phone-line access totally , This
would be a very welcome occurrence for system operators who must
worry about security. Think about whether you really need phone
lines to your system and about how tight your security is. In one case, I
was talking to a system operator who was not so security minded.
When he asked what terminal ! was working from, I shocked him by
answering that I was in a different time zone than he was. He had
thought that I must be in the building, because the phone lines hadn't
even been used in the almost two years he had worked there. This
company could easily have done without the eight or ten phone lines
that were dedicated to the machine but, as far as I know, the lines are
still there and still unused by employees of the company.
See if you can limit outside calls to a local telephone area . If only
local hackers can call your system, you may eliminate your current or
128
CHAPTER SEVEN Make the Moil el What foa'n Set
potential problems with hackers. The hackers who are local to you
won’t want to risk being found - the phone company has less trouble
tracing regional, rather than long-distance, numbers. I should mention
that most hackers would know of at least one way to get around
“regional numbers.” It involves using someone’s PBX, and it’s quite a
bit of extra trouble, however, so you’ll still discourage most, if not all,
local hackers.
If you must allow your users to call in from all over the country,
check the possibility of taking your main computer off the outside lines
and setting up a smaller, five- or ten-user system to handle the phone calls.
There are two ways you could go about this. The first, adopted from
the large networks and used by some computer-owning companies
with great success, allows users to call in and send information only.
For example, suppose you are part of a large newspaper company and
you must allow reporters to call in and transmit stories to your com¬
puter. Why put your multimillion-dollar computer, which is also re¬
sponsible for such things as payroll and subscriptions, on the phone
lines, when a nice ten-thousand-dollar system can do the job just as
well? After your reporter submits a story, you can then check it and
send it on to your main computer for word processing or typesetting.
The second approach to taking your main computer off the
phone lines is actually much broader based, because it allows users
both to send and receive information. In this case, you would still set
up a small system to answer the phones, but you could put on it any
non-secure files of information your users might need. For example, if
your company has sales representatives throughout the country, you
could keep such things as your product-catalog lists and prices on the
small system. Then, whenever your people needed to check product
information or, perhaps, check for messages or new leads, they could
call your small system without having to access the main computer.
In both cases, you would succeed in keeping hackers away from
the main system, and you would have the added advantage of pre¬
senting any possible hackers with only a small, relatively uninterest¬
ing computer to play with. There is the possibility that someone could
still set up a logic bomb by sending a special program or certain char¬
acters, but this type of occurrence would almost certainly have to be
129
OUT OF THE INNER CIRCLE
an inside job, because a hacker would need to know exactly how infor¬
mation was handled after it was input.
Keep the modem phone number(s) unlisted. This suggestion ap¬
pears to be common sense, but there really are a few listed modem
phone numbers. In a few cases, the number is meant to be very public
anyway, and the hacker doesn’t need to hunt for it-either he already
has the number or he can easily get it. But can you imagine being a
hacker, calling up information, and saying, “I’d like the number for
MegaCar. The research department, please.” And hearing, “Sir, do
you mean the computer or the voice line?”
If possible, keep your modem number(s) on a different three-digit
exchange from that of your listed numbers. In other words, if your listed
(or otherwise well-known) phone number is 555-1234, it is not a good
idea to have a modem line with the number 555-8537. Even worse is a
modem line with the number 555-1233 or 555-1235. A hacker may try
dialing the phone numbers that are very close to the listed number of a
company, for no reason other than it’s something to do. If your modem
number is close to your company number, he will succeed in reaching
your computer. Even if the numbers are not close, a hacker who wants
to get your modem number for a particular purpose can usually set his
modem to call all the numbers from 0000 to 9999 for your company’s
exchange. If he has the modem check for the answer of another com¬
puter, he can try about one number every seven to ten seconds. If he
monitors the modem calling himself, he can increase the rate to as fast
as one attempt every three to five seconds.
On the other hand, if the exchange for your computer differs
from the listed number of your company, the hacker is very likely to
give up after scanning the company exchange—after all, while he was
scanning the exchange for your computer, he probably found fifty
other computers to play with.
Ask the phone company to classify your modem phone lines as voice
grade, rather than the computer-only data grade. There is no difference
in quality between the two as long as connnunications are taking place
at 1200 (possibly even 2400) baud or less, and it pays to get your phone
number off the infamous data-grade list. Novice hackers have been
known to discover data-grade lists in telephone company trash cans,
130
CHAPTER SEVEN Make the Most of What You've Got
but since the only real difference in the two grades is a reference in a
telephone company computer, other hackers can gel hold of the lists in
“cleaner” ways, too.
I know of one case in which a semi-secret government computer
was very well hidden from scanning hackers. Rather than connect a
caller directly with the computer on the first ring, the modem would
ring three times, and a recording would then answer. After the record^
ing was over, there was a minute pause before the computer answered.
But despite these precautions, the modem was on a data-grade line,
and through a reference in a phone company computer, I had been
able to find the phone number and call the system. Actually, the other
security seemed quite good, too, so I never tried getting in. Pm sure
they spotted me while I was playing around.
Consider changing your modem number from time to time . A seri¬
ous hacker would only be slowed down a few hours by this tactic, be¬
cause that is about how long it would take him to pry your new number
out of the phone company. In this instance, though, you’re not protect¬
ing yourself from hackers, but from people who used to have access
to accounts on your computer system. IPs a useful precaution: There
are cases of people who have been fired, began working for other
companies in the same field, and found it possible to call up the old
computer at the old number and use their old account. What they do
once they get in is anybody's guess.
And while we're on this subject, remember to remove old or
otherwise unused accounts. Those people who called their old com¬
panies had to have accounts to use, and the odds are that they just used
their assigned accounts. In most cases, an account almost never gets re¬
moved unless the user requests it. But why should the user request it?
He's not going to be using the computer anymore, anyway.
Remember, in Chapter One, when I described how I got my first
account by entering LEE as both account and password? Well, the
owner of that account had not used it for about seven months, and in
the three months that I used Lee's account, I never knew him to use it.
And here's something else to note: When the system operator found
me, he changed the password. He did not remove the account; he just
changed the password.
131
OUT OF THE INKED CIRCLE
Consider having a telephone operator answer the phones, and hav¬
ing users request the computer. This is the best way to ensure that a
scanning hacker will not run across your system, Hackers who are
monitoring their computer’s calls out will hang up at the sound of a
voice. A computer will hang up at the absence of a carrier signal that
indicates it has reached another computer. There can be an added se¬
curity measure in having users request the computer, if the telephone
operator can get to know the key computer users by voice. A good al¬
ternative is to have a recording answer, as 1 mentioned earlier.
Have your modems wait at least two rings before answering. As
hackers well know, most modems will pick up the phone somewhere
between a half and one ring. If you make sure that the phone rings
twice before your modem picks it up, you will fool a scanning hacker
about sixty percent of the time. If you make sure your phone rings
three to four times before your modem answers, almost any scanning
hacker will already have moved on. Some hackers even scan by hand,
and these people will almost never wait for the second ring to finish.
Try to limit modem use to the accounts of only those people who ac¬
tually use it. Most systems allow any account to be used, by default,
from any terminal. But in almost every case I know of, fewer than
twenty percent of a system’s users ever use the phone lines. A more
representative figure would probably be three to seven percent. While
the number of people using phone lines is very likely to go up rapidly
as telecommunications becomes more widespread, people who work
with such applications as graphics or word processing usually would
not need to use the computer over the phone. There was one case in
particular that I feel will clearly show how limiting access to the ac¬
counts that need it would solve many problems,
The system involved was a powerful mainframe computer. Al¬
most all of the accounts on the system were owned by people who
entered text and data, but a few of the accounts were owned by people
who used the computer to look things up from a remote location.
Because of these few people, there were four or five phone lines going
to the computer. Some hackers found the phone lines and, using so¬
phisticated level-three hacking tactics, came up with a word proces¬
sor’s account, After getting onto the system, the hackers were able to
132
CHAPTER SEVEN Make the Most of What You're 6ol
obtain several more accounts. Each of these accounts was owned by
someone who never used the phone lines, but each of them was still
accessible to anyone with a modem, a microcomputer, and a little
knowledge about telecommunications. Furthermore, because the ac¬
count owners never used the phones, they had chosen passwords that
were relatively easy to crack. People who actually do use phone lines
have a bit more respect for password choice, because they see how
available the system is to outsiders.
Be certain your system logs off users who may hang up the phone
without logging off properly. This caution doesn’t apply to many sys¬
tems anymore, but hackers learn at the beginning of their “careers”
that there will always be a few systems that don’t automatically log off
forgetful users. This type of gap in your security could allow hackers
to set up decoy programs as I discussed in Chapter Five, but more
importantly, a hacker could call up on a Friday evening - when the
legitimate users are looking forward to the weekend and are the most
likely to forget about logging off. In this case, he will not even need a
password to use the system, and he will be able to use it on the two
days everyone else is gone. It clearly pays to make sure your system
logs yaoyle off when they hang up.
When a user wants access to your system, he or she must first log on. LOGGING ON
Since hackers must also log on, it is useful to set up a few barriers to
discourage hackers who have gotten through to your phone lines and
are trying to log on.
If possible, remove any type-ahead (character-storage) memory
buffers your system may have for storing keystrokes typed in during the
log-on phase. When a hacker tries to log onto your system, he is likely
to have a hack-hack program already set up for use with his personal
computer. This program will throw out an account, a carriage return,
a password attempt, another carriage return, and then cycle back to
the account for a new password attempt. The program runs very
quickly, Before the computer under attack has even had time to check
whether the account/password combination is valid, the hacker’s pro¬
gram has already sent the next password attempt.
133
OUT OF THE I N N E (I CIRCLE
Because of this speed, the hacker must depend on the fact that
the host computer has a buffer for temporary storage of characters
that come in too fast for immediate processing. If there is no such
buffer, the hacker will either need to write a special program for your
system or he will have to alter one he wrote for another computer.
Most hackers wouldn’t bother; if your system has no type-ahead
buffer for log-on attempts, they’ll switch to another tactic or simply try
another computer.
Make sure your system hangs up after one or two incorrect attempts
to fog on. Very few users, especially if they were aware of security
risks, would complain bitterly about having only one or two attempts
to get their account and password right. Many systems are already us¬
ing this technique, and I’m sure hackers will learn to live with the
slight inconvenience when it’s a bit more common. But for the mo¬
ment, hackers would rather choose an easier target that doesn’t hang
up so often, or that doesn’t hang up at all. It takes time to call a com¬
puter back for every log-on attempt.
Consider having your system cut off all incoming modem calls if
anyone makes five to ten unsuccessful log-on attempts in a row. The sys¬
tem could allow the users who were currently working with it to re¬
main on, but after five to ten unsuccessful tries, your modems would
refuse to answer any more incoming calls. The system operator could
then reset the lines anywhere from two minutes to an hour later.
If this system of security were adopted by a computer system, a
hacker would assume that these people must have a lot to protect, and
thus, thinking security is too tight, would move on to an easier system.
The main problem with this security measure is that, once it becomes
more well known, it could be used by crashers to keep users from call¬
ing in. I have only encountered one computer system that used this
method, and it seemed to work, but I still think the situation is tailor-
made for a crasher: All he has to do is keep calling with unsuccessful
log-on attempts, and no one can use the system.
A slightly better variation of this method would call for turning
off only the affected phone line for five to ten minutes. If your other
phone lines are well hidden, as I’ve described in this chapter, they
could then remain accessible to your legitimate users.
m
CHAPTER SEVEN Hake llte Host ot What You're Got
In any case, this is not a good idea unless you are trying to be
very secure.
Let the hacker know you are concerned about security by having the
system transmit a reminder before it hangs up. In a few cases, this action
would only motivate the hacker. But if the system says something like
VALID ACCOUNT NOT GIVEN - NOTIFYING SECURITY OPERA¬
TOR, the average hacker will figure (probably correctly) that the se¬
curity on this system is above average. He will then either move on or
decide to try and “talk” to the security officer by typing HELLO?? and
hitting Control-G (which makes the bell ring) a few times. As long as
no operator answers, all will be well. If an operator does answer,
well... try the approaches discussed in Chapter Eleven.
On a secure system, it is worth provoking one or two hackers by
reminding them of your security. Most will move on, and that’s what
you want. On a secure system, you are pretty well protected from
hackers getting on, so your concerns are more with keeping them
from tying up computer time and phone lines in the first place.
Set a limit to the number of users (two or three is fine) who can use
one account at any given time. Almost all computer systems allow many
people to log onto the same account at the same time. But at least
ninety percent of all users today have no need to use one account at
the same time as five or ten other people. Hackers, however, use this
feature to make one account work like many: They divide one account
into subaccounts for family and friends. There’s no point in keeping a
vulnerability you don’t need in the first place.
Have your system ask the user to verify the last log-on date or time.
Most systems do tell users when their accounts were last used, but
with the exception of one or two systems, most of those I’ve seen also
allow users to ignore this information altogether—so they normally do.
For example, a system that requests verification might show the user
something like this:
Account? SMITH
Password? XXXXXX
Welcome John Smith. You have new mail.
Last Logon Jan. 11, 1985-Verify? Y
135
OUT Of THE INNER CIRCLE
An N response to the verify question should close down the ac¬
count so that the system operator has to reset it Make it clear to users
that when they verify the last log-on time, they are taking responsi¬
bility for any damage that may have been done during that session.
Verification of account activity won't keep hackers from getting into
your system. Nor will it prevent them from using an account, since all
they need do is type Y to keep it open. What verification will do is alert
you, the users, and the system operators to hacker activity. And once
you know that hackers are on your system, you can take steps to
remove or change the account and password or to tighten your system
security all around.
Don’t give the hacker any information before he’s logged on . Your
system should not prematurely give out information that is requested
by a hacker (or a user). On some systems, for example, typing HELP
before logging on will actually get the hacker to the system’s help files*
In other cases, the request will only tell the hacker the format for ac¬
count names or, perhaps, the name and phone number of the person to
call if you have trouble. By far the worst thing to do, however, is allow
hackers to find out who is logged on at the time. Making this informa¬
tion accessible is like handing them all kinds of accounts and asking
them to try and get the passwords - and they probably will try.
If possible, you should also hide the make and version of your
system. A hacker receives quite a bit of help if your system tells him,
MEGACOMPUTER OPERATING SYSTEM, VERSION 18.6.4 before
he even has to log on.
Don't give the hacker any power before he is logged on.This is an
obvious suggestion, but it is not always followed. If your system allows
users to do anything before they are properly logged on, it only helps
hackers. In one extreme instance, the Inner Circle was able to find out
the password of the last person who logged onto the system, because
that system allowed users to examine memory cells without logging
on. Granted, examining memory requires some technical ability, but
high-level hackers often have both the motivation and the knowledge
to do such things.
There is also another, easier, loophole that is still reasonably
common. At least one operating system, TOPS, on a DEC-10, lets you
136
CHAPTER SEVEN Hike the Moil a! WM lou'n 6a!
type messages to other users without logging on. Thus, a hacker can
talk to other users and even set up a remote sysop program if he wants
to - all without logging on. This particular system is a little outdated
for a corporate computer, but smaller businesses, as well as many
schools, are now using it.
Passwords are a basic form of security used by every serious multi¬
user system. In many cases, passwords are both the system’s first and
last lines of defense. Judging by my own experiences I would estimate
that, if it weren’t for password misuse, at least eighty percent of all
hackers would never see the inside of a large computer. Here are a few
tips on using and assigning passwords.
If possible, avoid the use of a single, default password. A default
password is one that is given to all accounts when they are first
opened. The account owners are then expected to change the default
password to a private password of their own choosing. For example, if
two different potential users apply for accounts on their company
computer, and the computer uses PASS as a default password, both
users will be assigned the password PASS.
While they are expected to change passwords, users almost never
do. And sooner or later, a hacker finds out about the defaults - more
often than not through a contact within the company. Hackers know
that defaults are seldom changed. In fact, an international mail com¬
pany that used default passwords became well known for using the
password A for most of its accounts. And, when hackers found out
about this, of course they used the information. Once they were on the
company’s system, a few even managed to get high-level accounts that
had no default password. The hackers used these high-level accounts
to create their own accounts on the mail system.
Be wary of using a predictable method, or pattern, of assigning pass¬
words. Although a systematic method is a much better way to assign
passwords than the default method I just described, many of the “sys¬
tems” people use are just too simple. I’ve seen many systems-like the
first one I got onto - in which the password is the same as the account
name. A few more overly simple patterns that are commonly used are
PASSWORDS
137
our OF ! H £ INNER CIRCLE
first names, birthdates, and last names. You could probably get away
with something like spelling the last name backward for a while, but if
a hacker catches on to your system, he will be able to use the informa¬
tion to his advantage as easily as he can any other system. If you must
use a systematic method of assigning passwords, make it partly depen¬
dent on the date or time the password is issued.
Don’t assign long, random passwords. These passwords are almost
always hard to remember, so people are either going to change their
passwords to a single easily remembered character, or they are going
to write down their complicated passwords somewhere. Obviously,
secret passwords are not meant to be written down; any time they are,
the odds that they will be seen lying on a desk or be found in the trash
go up quite a bit.
Another problem with random passwords is that they are often
typed slowly - because they are strings of nonsense characters and
also because the user doesn’t want to make a mistake. Wouldn’t most
people have trouble remembering, much less typing, a password like
GXLWTDPS? A hacker who was watching, however, would have a
chance and the motivation to remember where and in what sequence
the user has typed on the keyboard. Some hackers would easily be
able to copy a user’s sequence of keystrokes when they got home to
their terminals.
If your method of assigning passwords is not particularly secure and
you can’t or don’t want to change it, then have your system ask for a new
password the first time a new user fogs on. You may want to consider
doing this no matter how well you are handling password assignment,
but if your assignment procedure is not a good one, having the system
request a new password is a vital step. If you just assume that users are
going to change their passwords, you will find out shortly how wrong
you are. For instance, I once “acquired” several passwords to a large
high-tech firm’s mail system. The owners of the accounts I was using
had not changed their default passwords and I used the system for over
a year before the passwords did change - by order of management.
The users had very little to do with it, but if they had changed their
passwords when they received their accounts, 1 might never have seen
the inside of that system.
138
CHAPTER SEVEN Mike the Most ol Whit t/ou'te Be!
Having your system request a new password is a very good se¬
curity measure, especially if you don’t use defaults or easily guessed
passwords for new accounts. If you do use easy “first” passwords, it is
possible for a high-level hacker to fool your users in the following way.
(Bear in mind, though, that this would be quite a sophisticated
hacker.) First, he would monitor the system operator’s terminal.
When he saw that a new account was being created, he would log onto
the account ahead of the actual account owner. When the “change
password” program requested a new password, he would probably try
to change the password to itself - in other words, the hacker would
have to change the password to satisfy the system, so to avoid arous¬
ing suspicion in the user, the hacker would try to tell the computer that
the new password was the same as the original. If this tactic worked,
he would then run his own program that would simulate the operating
system, allow the user to “log on,” request (and record) a new pass¬
word, and then turn the user over to the real system. When the user
logged off, the hacker would then log onto the account, change the
password as the user had requested it to be changed, and record the
new password for his own future use.
Make sure that users on the system know how to change their own
passwords. I have talked to users who swore that it was impossible to
change their passwords. The fact was, all they had to do was type
HELP PASSWORD, HELP SET PASSWORD, or something very sim¬
ilar, and the system would walk them through the procedure. The
moral of the story is, if users think that passwords are a sysop-given
gift, not to be messed with, they will never change them.
Once they know how to change their passwords, be sure your users
think of security, as well as convenience. Most of the passwords on a
given system are chosen by users with convenience, not security, in
mind. Going on past experience, hackers know that a fairly large num¬
ber of passwords on a given system will consist of a single character.
Just about as many will be the user’s first name. And quite a few more
will be neither first name nor single character, but still something sim¬
ple, such as PASSWORD. These users were not thinking of security
when they chose their passwords, so those people who do care about
security-managers or system operators—must remind them.
139
0 U I Of l H f INNER CIRCLE
There is one other class of users to consider, too: the ones who
choose run-of-the-mill passwords, such as SECRET or SEX. In most
cases, these users are thinking of security when they choose a pass¬
word, and perhaps they think they are being quite clever - they just
don’t realize how many other people think the same thing.
The Best The problem of password assignment is not likely to go away anytime
Passwords soon, unless some radical new development somehow solves the se¬
curity problem. So how can a single system operator assign four hun¬
dred passwords so that each one will be different from the others, yet
all of them will be simple enough for the users to remember easily?
The problem is solvable in several different ways; the methods differ
according to how your system is set up. If the operator is required to
enter the password, then, of course, the choice is up to the operator. In
most cases, however, the system can be set up to do the work.
The best procedure I have seen for password assignment was a
custom software subroutine. The program chose a word at random
from a list of over ten thousand five- and six-letter words, and then it
added two random characters. The result was an easy-to-remember
password, such as RINGER SQ or STICK CJ, that, because of the two
meaningless characters, a hacker had little chance of hacking. Even if
the hacker could get the data base that contained the words, he would
(in theory) still need to go through as many as 10,000 x 26 x 26 possi¬
ble combinations for each account. Common password procedures
that seem to work well include running two words together or allow¬
ing the user to choose a very personal password of his or her own and
communicating the password verbally to the sysop before the oper¬
ator creates his or her account.
DISGUISING This is a very good time for hackers: They have the luxury of choice.
YOU R S YSTEM One large network brags of having over twelve hundred systems on it.
Another claims over eight hundred. Both networks can be called from
most cities with nothing more than a local phone call. These are two
examples out of many. With so much to choose from, why, then, would
a hacker settle for anything but what he wants? Depending on the
140
CHAPTER SEVEN Mike the Most el I that touVe So!
hacker, “what he wants” could be as simple as a computer that is on a
network and thus is very accessible. For most hackers, however, the
ideal is a computer that doesn’t make him work too hard to get in. For
a few others, it might be the name of a large or famous company, or it
could be a very expensive, state-of-the-art computer.
In most cases, though, a simple cosmetic change in your system
will make a curious hacker move on in search of what seems to be a
more interesting system. Consider these two examples:
M-C prts inv SYSB
12(7.8)
OP +
Account?
and
MegaCar Corp/Parts inv SYSTEM B
120 Ports (78 logged in)
Operator present
Account?
The first example contains all the information present in the sec¬
ond example but, unless you already know whom you’re calling, it
hides the fact that a large company owns the system, and that the
system itself is fairly large (120 ports). The first example would likely
cause many hackers to move on to something they recognized or that
sounded more interesting; the second, given the company name and
the obvious size of the system, would probably make most hackers sit
up and take notice. Both displays would tell an informed user every¬
thing he or she needed to know, so the only person who would be
“hurt” by the terseness of the first example would be the hacker you
want to discourage in the first place.
CHAPTER EIGHT
External Security Devices
s
J ome people believe that security devices like the ones I’ll de¬
scribe in this chapter are the best possible solutions to the problem of
computer security. To some extent, they’re right. But as you’ve seen,
security depends on people, and the effectiveness of any security de¬
vice depends not only on the device itself, but on the hacker who is
attempting to defeat it and on the other security measures that back up
the device. I don’t think hardware alone will ever ensure complete
security-at least not until it is as “intelligent” as a determined hacker.
StiU, as I noted in Chapter Six, ninety percent security is all that most
systems need. And some of the equipment currently available is very
effective, at least as far as deterring most hackers. Or, rather, it’s effec¬
tive as long as the system operator or security manager doesn’t fall
into the trap of thinking that other security measures, such as pass¬
word procedures, are rendered obsolete by the fancy new hardware.
Some advertisements claim security systems that are as close to
one hundred percent uncrackable as possible. Others boast limitless
M3
OUT OF THE INNER CIRCLE
ENCRYPTION
DEVICES
numbers of security codes, claiming that a hacker would spend hun¬
dreds or thousands of years trying to break these codes. If you are
thinking about buying one of these devices, ask some questions of
yourself and of the equipment vendor before you buy: “How does it
work?” “How effective (and cost-effective) is it?” and “Is it what I
need?” This chapter will try to answer such questions for most of the
equipment now available.
The companies that sell these devices tell you (understandably)
every good point about their systems. But since very few things in this
world are flawless, I’ll point out some of the vulnerabilities of these
methods of defense, too - at least as far as hackers are concerned. In
addition, because colorful literature sometimes does not explain ex¬
actly what the device does, I’ll also try to explain how each of these
devices works.
Almost every security device now available fits into one of two
categories: data encryption or callback. Briefly, data encryption is a
method of encoding data so that the information will be unreadable
without a code-breaking “key.” Callback is a method of limiting access
to a computer by having the system verify a user’s authorization and
then call the user back at a specified phone number. We’ll examine
these two methods in depth, and then briefly go over the other secu¬
rity fixes that are, or are becoming, available.
By their nature, encryption devices are not intended to keep hackers
out of any computer system. Rather than limit access to the machine,
they limit access to information. They are designed to keep some or
all of the data on a system secret by rendering the information unread¬
able. An encryption device can be either hardware or software. In
either case, most such devices take text and alter it according to a key
that is either chosen by the user or is generated as a string of random
characters by the device itself. When the information needs to be
read, the same process of alteration is applied in reverse.
If the device is hardware-based, the encryption unit is placed
between the computer and the terminal. The device does not require
a user to run any special encryption program, and it both encrypts
144
CHAPTER EIGHI hternai Security Devices
outgoing data and decrypts incoming data. With most such hardware
encryption devices, the risk of losing or guessing the key is minimal,
because the user does not need to choose or keep track of the key. If
the device is software-based, the user must run a special program to
encrypt or decrypt files. In this case, the program will ask the user for
a file and a key, and it will encrypt or decrypt the file using the key
given by the user.
Here is a simplified example of the way encryption works. Let’s as¬
sume that we have in the computer a small text file we want to have
encrypted. We’ll name our file SAMPLE and simply let it consist of the
phrase OUT OF THE INNER CIRCLE.
Now the fun begins. We run a program called Encrypt, and it
asks us what file we would like to encrypt. We respond with SAMPLE,
and the program requests a key to use in encrypting it. For this exam¬
ple, we will choose a very simple key, the word KEY. The program will
then internally match up the key/text combination as follows:
K E
t i
Y
i
K E
i i
Y
i
K E
i i
Y
i
K E
i i
Y K
t i
E
i
Y
i
K
i
E Y K
i i i
E
j
Y
i
K
E
i
i i
0 U
i
T
i i
0
i
F
i i
T
i
H
i i
E
i i
1 N
i
N
i
E
\
R
1 1 1
C I
i
R
i
C
i
L
i
E
Next, the program will encrypt the text of our file, using the
ASCII system. As you may recall, a standard ASCII character set in¬
cludes 128 different characters. We call them characters, and so they
are to a computer, but not all of them look like ABC’s and 123’s. Some
are what are called control characters that ring bells, symbolize car¬
riage returns, and so on. Regardless, each character is assigned a
unique number from 0 to 127.
For our simple example, the program Encrypt will take the
ASCII value of the character in the top line and then subtract it from
the value of the matching character in the bottom line, “wrapping
around” (going back to 127) if the values go below 0. The first O in our
text file will be transmitted as the ASCII code for Control-D. The sec¬
ond O in this text, however, will be transmitted as the ASCII code for
Control-J. (If you want to follow through on this process, the ASCII
codes and the results of this encryption are shown on the next page.)
How Data
Encryption
Works
M5
our OF I H E INNER CIRCLE
THE ASCII CODES
0
>'
26
'Z
52
4
78
N
104
h
1
27
1
53
5
79
O
105
i
2
~B
28
54
6
80
F
106
J
3
X
29
■]
55
7
81
Q
107
k
4
"D
30
56
8
82
R
108
1
5
"E
31
57
9
S3
S
109
m
6
A F
32
Space
58
84
T
110
n
7
X
33
r
59
5
85
U
111
0
8
X
34
60
<
86
V
112
P
9
35
#
61
=
87
W
113
q
10
36
S
62
>
88
X
114
r
11
X
37
%
63
?
89
Y
115
s
12
X
38
&
64
tft-
90
Z
116
t
13
39
*
65
A
91
[
117
u
14
*N
40
(
66
B
92
\
118
V
15
X
41
)
67
C
93
1
119
w
16
X
42
■*
68
D
94
*
120
X
17
X
43
+
69
E
95
_
121
y
18
"R
44
I
70
F
96
1
122
z
19
A s
45
-
71
G
97
a
123
{
20
*T
46
72
H
98
b
124
\
21
A U
47
/
73
I
99
c
125
\
22
A v
48
0
74
J
100
d
126
-
23
A w
49
1
75
K
101
e
127
Rub Gul
24
~x
50
2
76
L
102
f
25
"Y
51
3
77
M
103
8
THE ENCRYPTED FILE
OUT OF THE INNER CIRCLE
KEYKEYKEYKEYKEYKEYKEYKE
DP { T J 1 TOnyZoCI k G Z i } M i A @
The underlined characters are control-characters. On a typical termi¬
nal, the encoded text file would print out like this:
%{T
lTnyZoIk <BELL RINGS> Zi}
Of
fo
And that's itf Pretty unreadable ....
146
CHAPTER EIGHT liternal Security Devices
When the file is to be decrypted, the program will reverse the
process by arranging the text/key combination in the same way and
adding the values. This method ensures that each character in the text
can be encrypted in many different ways, depending on its position in
the text and in relation to the characters in the key. So once you have
encrypted the file, it is impossible to read unless it is altered in reverse
by the same key and process that altered it in the first place.
More complex methods of encryption use essentially the same
technique, but they may go through two or more passes to further en¬
code text, or they may take a simple key, like KEY, and make a longer
and more complex key out of it. In addition, hardware encryption
devices may use random-number keys that are not chosen by the user
and, since they are based on sets of random numbers, cannot, in them¬
selves, be second-guessed by a curious intruder (although the text can
still be decoded if enough of it follows a known pattern).
One problem with hardware encryption is simply that it’s expensive.
Most of the time such a device will cost at least $10,000 to install, and
it is possible for a hardware encryption setup to cost a lot more.
A second, possibly more important problem that applies to both
hardware and software encryption devices is the fact that there will al¬
ways be the possibility that someone can decode the text. It is true that
mathematicians conduct research and publish papers about encryp¬
tion methods, and encryption standards are closely monitored by the
National Security Agency. Even so, you don’t have to be in an intel¬
ligence agency to crack a code. Standard code-breaking strategies are
available in books in any public library. If the encryption method is
simple (as in our example) and the person trying to decode your text
knows that most of your messages start out...
MEMORANDUM
TO
FROM Bill Landreth
DATE April 1, 1985
SUBJECT
Problems with
Encryption
147
OUT OF THE INNER CIRCLE
... he or she has plenty of clues to your encryption key in that infor¬
mation alone. Unfortunately, some of the encrypting programs avail¬
able today are just about that easy to crack or thwart.
You should also be a little wary when you read something like
“would take several centuries of computer time to decode your DATA-
SCRAMBLE encoded text files." The statement is undoubtedly true,
but figures of several centuries usually depend on the user entering a
complex key that is of a certain length (long), and may contain a few
strange characters. Remember from Chapter Five that it would take a
hacker twelve-and-a-half thousand years to try every possible upper-
and lowercase combination of six letters? Well, some computer
systems allow their users to have passwords as long as 256 or 512
characters, including control characters and numerals. If a hacker
knew that all passwords on a system were going to be of this type, he
would certainly give up. But, of course, people will always pick simpler
passwords and keys.
At its core, software encryption, as it is implemented today, is
simply a different form of one of the original security concepts: the
password. The human factor has always made passwords reasonably
easy to guess, so it’s not a very good idea to assume that keys will be
any more difficult to figure out.
Another possible problem with software encryption devices is
that there is no easy way to recover the key if the user were to lose or
forget it, After all, if the key could be recovered from the text file, the
encryption scheme wouldn’t be very good, would it? Because of this
risk, even if the user has an excellent memory and chooses a very sim¬
ple key, he may very well decide to write it down somewhere, “just in
case,” or even store it in the computer, so that loss of his key won’t
mean actual loss of the data that he is protecting by having the key in
the first place.
Finally, there is a problem associated with some hardware en¬
cryption devices that depend either on a special terminal or on a de¬
vice that is hooked up to a terminal and has the method of decoding
text built into it. These devices are vulnerable, because a computer
criminal would only need to gain access to the terminal in order to
gain access to the computer system.
14S
CHAPTER EIGHT Menel Seeurilf Devices
In theory, callback units are very good ways to keep hackers off a
system. Here’s basically how they work: When a user calls a computer
attached to a callback unit, the callback unit requests the user to enter
an ID code. After an ID code is entered, the callback unit hangs up on
the user. It then checks the ID code for validity. If the code passes the
test, the computer then calls the user back at an authorized phone
number it has matched up against the user’s ID code. With most call¬
back units, the user then has to go through the normal procedure of
entering his account and password. Of course, since the unit verifies
the phone number, it will not call a hacker at an unauthorized location.
And even if it did, for some reason, the company would have a record
of the number it called and would know where to find the hacker.
The better versions of callback units answer the phone and allow
the user to enter an ID code only from a touch-tone phone. The com¬
puter is not involved in the contact, so there isn’t any chance that a
hacker could gain access from this point. Less secure callback units,
however, have the system answer the call, and they let the caller enter
an ID code from his computer.
These latter units offer a hacker a small chance to break out of
the controlling program and gain access to the system. The possibility
may seem remote, but I have been told that this has been done quite
effectively. I heard the story from a system operator on a system that
seemed to be very concerned with security. When I asked the oper¬
ator why it had been so easy for me to get onto their system if they
were so worried about security, he told me that they had been rather
spoiled by a callback unit. They had depended on this device for sev¬
eral months, but they had to stop using it after it was involved in a
major breach of security.
The device that the system had used required that the host com¬
puter set up a special account, under which the callback-unit software
was run. When a caller called the computer, the main computer, not
the callback unit, answered and asked for an 1D code. Once the user
entered an ID code, the computer searched through its directory of
valid codes. If the code was valid, the system hung up and had the mo¬
dem redial the user. The problem came up if the user happened to hit
Control-Z while the system was searching the files.
CALLBACK
UNITS
149
OUT OF THE INNER CIRCLE
Problems with
Callback Units
Control-Z is a common signal used to tell a computer, “That's the
end of my file (or input)” When this signal was received by the call¬
back unit, the result was an “end of file” error After this error mes¬
sage, the user was no longer under control of the callback program, but
in the account set up to be used by the callback-unit software. And
from this account, a person could get the entire list of account names
and the valid codes and phone numbers of the people authorized to
use the system. The company was never able to fix this problem, so it
just stopped using the callback device.
There are a few limitations to the general use of callback modems that
you should be aware of before you invest in one.
= Unless the company provides specially prepared terminals\ the
user needs to have some general knowledge of computers , be¬
cause he or she has to set up a personal computer and modem to
answer the main computer's return call
~ The user has to be at a specific, authorized phone number to
receive the return call No calling from a phone booth in Silicon
Valley while trying to sell Apples to IBM . Yet this type of ac¬
cessibility is the reason why many companies need phone lines
in the first place.
~ Commercial networks are out of the question with callback
units. As of right now, / know of no reasonable plan to use a
callback unit and a network together
~ The phone call is charged to the main computer In this age of
multiple phone companies and ZUM zoning (a telephone com¬
pany method of phasing out ‘‘local** calls), costs may add up
quickly for the computer owner
Unlike data encryption devices, callback units are meant to keep
unauthorized people out of your system. For the most part, a callback
unit does a very good job of stopping the type of hackers I am discuss¬
ing in this book, but most of these hackers could be stopped just as
easily by proper use of passwords. Only you can decide if the extra
ISO
CHAPTER EIGHT External Security Devicei
expense of a callback unit is worth keeping out casual hackers. Bear in
mind that a hacker who is also a thief or has other strong motives for
getting into your particular system could get around a callback unit in
many ways.
With most phone systems, it is quite possible for the hacker to use the
following steps to get around a callback unit that uses the same phone
line for both incoming and outgoing calls: First, he calls the callback
unit and enters any authorized ID code (this is not hard to get, as you’ll
see in a moment). After he enters this ID, the hacker holds the phone
line open - he does not hang up. When the callback unit picks up the
phone to call the user back, the hacker is there, waiting to meet it.
The ID code, as I said, is simple for a hacker to obtain, because
these codes are not meant to be security precautions. The callback
unit itself provides security by keeping incoming calls from reaching
the computer. The ID codes are no more private than most telephone
numbers. Some callback units refer to the codes as “location identi¬
fication numbers,” and some locations are used by several different
people, so their IDs are fairly well known. I’ve been told that, in some
cases, callback units also have certain simple codes that are always de¬
fined by default.
Once the hacker has entered an ID code and the callback unit has
picked up the phone to re-call him, the hacker may or may not decide
to provide a dial tone to allow the unit to “think” it is calling the cor¬
rect number. In any event, the hacker will then turn on his computer,
connect with the system - and away he goes.
If, however, the hacker has trouble holding the line with this
method, he has an option: the intercept.
Holding the line will only work with callback units that use the same
phone lines to call in and to call out. Some callback units use different
incoming and outgoing lines, but there is an equally simple way to fool
them. These systems work like any other callback units, except that,
for example, numbers 555-3820 through 555-3830 are dedicated to
users’ incoming calls, and lines 555-2020 through 555-2030 are dedi¬
cated to the computer’s outgoing calls.
151
Holding the Line
The Intercept
0 it I OF THE INKER CIRCLE
Call Forwarding
The only thing a hacker needs in order to get through to these
systems is a computer and a little time - he doesn’t even need an ID
code. First, the hacker calls any one of the outgoing phone lines, which,
of course, will not answer. Sooner or later, though, while the hacker
has his computer waiting there, listening to the ring, an authorized
user will call one of the incoming lines and request to be called back. It
will usually be less than an hour’s wait, but the hacker’s computer is
perfectly capable of waiting for days, if need be.
The callback unit will take the code of the authorized user, hang
up, verify the code, and pick up the phone line to call back. If the unit
tries to call out on the line the hacker has dialed, the hacker has his
computer play a tone that sounds just like a dial tone. The computer
will then dial the number given that matches up with the user’s autho¬
rization ID. After that, the hacker can just connect his computer as he
would in any other case. If he is really serious, he will even decode the
touch tones that the mainframe dialed, figure out the phone number of
the user the system was calling, call this person, and make a few
strange noises that sound as though the computer called back but
didn’t work for some reason.
Many switching systems around today enable a hacker to use call for¬
warding to his advantage. I f the hacker knows the area code and phone
number of an authorized user, he can simply use his contacts within
the phone company {something hackers usually have no lack of,
thanks to the phone phreaks of the ’70s) to set call forwarding on the
user’s line. Then, the hacker has the user’s phone calls forwarded to a
place he chooses.
Cali forwarding can be used with callback units, and has been
used in this way by one thief who worked in the company he robbed.
Because he was an employee, he found it easy to get the inside infor¬
mation he needed to have call forwarding set on a friend (and co¬
worker’s) house phone. He then used his friend’s account to set up a
scheme to defraud his company out of nearly one million dollars in
technical equipment. The company’s managers spent several days
working to build a case against the friend, whom the callback modem
called, because they believed there was no possible way anyone else
tS2
CHAPTER EIGHT hlernal Settirilf DevUes
could be receiving the computer’s return calls. By the time they real¬
ized they were wrong, the real thief was long gone.
1 haven’t heard of this happening, but I think it is possible that a call¬
back modem could have a trapdoor built into it. Callback modems are
run by software, which is written by programmers. An unscrupulous
programmer could find it very easy to slip in an unpublicized routine,
such as, “if code = *43*, then show all valid codes and phone num¬
bers.” And such a routine, of course, would leave security wide open
to anyone who found the trapdoor. The obvious protection here, as¬
suming the situation ever arises, is simply an ethical manufacturer that
checks its software thoroughly before releasing it.
Callback units don’t solve such problems as direct wiretaps or the
hacker who is an employee of the company. It’s even possible that a
burglar or a hacker who is a friend of an employee could call from an
employee’s house and cause trouble. This vulnerability means that
callback units can, in many cases, turn out to be too much trouble and
expense for companies guarding against hackers, but not adequate
enough, by themselves, for companies guarding against thieves.
Encryption and callback technology cover most of the external secu¬
rity devices available today. There are a few others, however, that you
can also consider.
With a filter system, a non-computer tone or perhaps a computerized
voice answers the phone. The user is then expected to enter an identi¬
fication number from a touch-tone phone. Once this is done, the filter
system hands the caller over to the operating system.
Filter systems are a kind of compromise between having a call¬
back unit and not having a callback unit. In fact, many callback units
can optionally be used as filters—although, if you use a callback unit as
a filter, you are also paying extra for features that you don’t use.
As a security measure, filter systems are good for guarding
against casual hackers, primarily because the price is usually lower
IS3
Trapdoors as a
Possibility
Criminals
OTHER
SECURITY
DEVICES
Filter Systems
0 IP I OF THE [ N N E ft CIRCLE
than that of most callback units, with about the same effectiveness
against all but the most dedicated hackers. Most filter systems also no¬
tify the operator if there are more than a certain number of incorrect
attempts at an identification number - a good idea, because hackers
might otherwise decide to leave an autodialer on the system for a few
hours. On the other hand ,., a filter system with a 90-decibel alarm
that the operators can’t shut off might only make it more fun for a
Crasher to put an autodialer on the system.
Improved Log Almost every computer system has a program, a user log, that is ah
Systems ways running and is supposed to keep track of users. But there are
different types of user logs. Some only contain information that looks
like this:
Account STD123 logged in at 7:48:7 for 55 minutes and 1 second.
This user log just tells who logged on, when, and for how Long. A user
log may, however, contain information that looks like this:
Account STD123 logged in at port 061 with modem 9 at
7:48:7 for 55:01.
Account accessed: Home directory at 7:49:16, Account directory
at 8:10:38, System directory at 8:11:2, Home directory at
8 : 20 : 21 .
Account sent mail to user(s) STD33, STD768.
Account had total of 6 errors and 1 help access.
This log tries to follow the user through the system. First, it tells
us the user called and used port 61, modem 9. This person first used
his or her assigned directory — the Home directory. Then, the user
went over to the Account and System directories, and nine minutes
later went back to the Home directory Sometime during the log-on
period, the user made six errors, asked for help once, and “mailed"
two electronic letters.
More secure systems - those that would not even allow a phone
line within fifty yards of the computer installation - might have user
logs that actually record every single keystroke a user enters. At the
154
[HAPTIC I 1 G H T it/ernet Security Devices
other end of the spectrum, the least secure systems may not have user-
log systems at all. But most systems fall somewhere in between these
extremes, and I know of one, a mainframe computer, running a
custom-made operating system for a large real-estate company, that
came close to hitting both extremes in a matter of a few days.
The operators on this system normally never bothered to keep
logs — they felt the computer time saved in not running the log pro¬
gram was more than enough compensation for the security risk in¬
volved. One slow day they were bored, so they offhandedly decided to
run their log program to see what was going on in the system.
Their log program kept simple records, like the first of the two
preceding examples, but the one thing that stood out was the fact that
one account seemed to be in constant use. The operators did not rec¬
ognize the account, and wondered why it seemed to be active for at
least six of the seven hours they had run their log program. So, they
decided to write their own program, one that would record more accu¬
rately what the account was doing and what type of files it was keep¬
ing. What they found surprised them.
They had expected to find some program that would notify a
realtor if a house came along with more than X square feet, at a price
of less than Y dollars. What they actually found was a bulletin-board
system set up by hackers. After reading the messages on the bulletin
board-which had been there for eight months-the operators posted
this message of their own:
From now on, this bulletin board system will not allow access
between the hours of 11:00 AM and 3:00 PM due to excessive
demands on the system during this time.
Users of this system will also be expected to continue their
practice of non-destructiveness.
Thank You,
Your new Sysops.
Companies that sell improved user logs, which may be in the form of
either hardware or software, claim that the device will make it easier
Problems and
Solutions
155
OUr OF THE INNER CIRCLE
Terminals with
Unique IDs
to tell who logged on, what they did while they were on, and when
they logged off. Quite often, a system that is supposed to improve the
system logs is included with a callback unit or other security device.
The problem with any software, and some hardware, log system is that
the more accurate the log, the more computer time is spent keeping it.
Some systems are already overworked and can’t even run the log that
originally came with the machine, much less a more elaborate one.
In addition, system logs are generally ignored by system oper¬
ators, and in most cases it is hard to blame them. A very good log on a
busy system might produce, on a daily basis, a hundred pages of user
information for the operators to look over. A very poor log system
might only produce one page of information, but it also might not have
a chance of showing a hacker’s activity. With either type of log, even if
the operator spends an hour every day checking the system logs, he
might not find anything wrong for years. Besides, an operator who has
spent an hour a day looking over the logs may start to get lazy after
three years. Then, if he “forgets” to read over the system log every
day, his manager, in turn, may think that the system is secure because
nothing is reported wrong with the logs. Often, operators compromise
by ignoring the logs and simply watching activity on the system from
time to time.
An improved log system would make life easier for the operator
and harder for the hacker. A perfect user-log system would automat¬
ically notice strange activities and record this information in a way
that would make it easy for the operator to see among the rest of the
{mostly useless) data: bold-faced print, perhaps, or a different color,
or underlining. Things an improved log system should detect include
more than two users on one account, more than one false attempt on a
valid account’s password, access to system files (files used by the sys¬
tem, but not to be used by users), and too many help-file accesses {a
favorite ploy of hackers).
This type of system is very secure if it is set up and used right, but it
can also be the most costly to implement. It involves using special
terminals, each of which has a different ID code. The system to which
the terminals are connected requests each terminal’s ID code every
156
CHAPTER EIGHT hlernal Secant, Devices
now and then when the terminal is in use. Less secure systems like this
will ask only once, but the more secure systems may be asking con¬
stantly. In a properly arranged setup of this sort, the system asks the
terminal for its ID in thousands of different ways. In English, these
questions are along the lines of:
“Give me your ID.”
“May I have your ID?”
“Who are you?”
“Tell me your ID number.”
... and so on, for several thousand different variations of the same
question. The terminal itself has thousands of answers to return - one
unique answer for every one of these unique questions. If the terminal
gets any of the answers wrong, the computer will ask a few more times
and then refuse to talk to the terminal anymore.
This type of security measure is best suited for terminals that are
not to be used over the phone system, because the extra communica¬
tions needed for ID questions and answers would slow down commu¬
nications too much. Telephone communication, remember, is much
slower than computer-to-computer or computer-to-terminal commu¬
nication. Besides, at this high level of security, your concern is more
likely to be theft or espionage, rather than hacking, and encryption
solves phone-related security risks better. If you need this level of
protection, you may need something better than an ID system.
I have encountered modems that operate at 500, 600, and 1800 baud
(rather than the usual 300 and 1200 baud); terminals that use a per¬
sonalized character set, rather than ASCII; and computers that require
the user to type the Delete character as enter and the Enter key as
delete. In the installations I have seen, all of these nonstandard meth¬
ods were very effective in keeping hackers out because, as I’ve said
before, it’s best from the hacker’s point of view to move on to easier
systems to crack. Computer criminals would have little problem get¬
ting around this type of system if it used a nonstandard method alone,
but for keeping thieves out, I would bet on a system that had educated
Nonstandard
Devices
1ST
OUr OF THE INNER CIRCLE
THE
FUTURE
Passphrases
users, nonstandard baud rates, educated users, a callback system, ex¬
cellent logs with careful personnel to watch them, educated users, and
a good encryption device.
Not many systems use nonstandard equipment, so my experi¬
ence with them is limited, but I would say that if you want to keep out
casual hackers, you would do well to look into this idea.
A company must still provide terminals that are capable of using
nonstandard signals, but part of the reason nonstandard devices are
worth looking into is the fact that using them may be no more expen¬
sive than using standard equipment, and may be as effective at keep¬
ing out casual hackers as a $20,000 encryption system.
Data security can only improve. The computer-security industry will
mature as companies that produce security devices revise their prod¬
ucts and work on resolving complaints from customers. Ultimately,
companies will come up with better encryption, callback, and pass-
word-protection schemes. System programmers are spending more
effort in preserving security. And as for the computers themselves,
consider that most of the machines built before 1980 essentially had
no built-in security when compared to those being built today.
Once user education is accepted as a vital part of computer se¬
curity and corporate executives know how to choose the security
measures best suited for their system, unauthorized computer tres¬
passing will take a giant step backward. But if better security is inev¬
itable, advances in technology and security enhancement are open to
our imagination.
1 don’t know when the changeover will happen, but I think the com¬
puter community is not far from abandoning passwords in favor of
passphrases, A passphrase like THE CAT JUMPED QUICKLY will be
much easier to remember and assign, as well as much harder for the
intruder to guess. Of course there will always be a few passphrases
that hackers will be able to use successfully - predictable ones, like
I AM JOHN, LET ME IN, or 1 LOVE YOU. But all things considered,
widespread use of passphrases will definitely be a security boon.
158
CHAPTER EIGHT External Security Devices
This technique seems to be a natural method for use with telecom¬
munications, because the medium of identification, the voice, is easily
sent over phone lines. Computer-based systems for identifying voices
have been under development for a long time, and voice-recognition
technology is reportedly on the verge of reaching a widely acceptable
level. A system using voice verification would probably answer with a
tone, have the user key in an ID number, and then ask the user to state
his or her full name. Unless the person were to key in the correct
number and pass the voice test, no computer contact would be made. If
the caller did pass both tests, the computer could make the connection
or a callback process could start. And for additional security, the user
could just enter an account and password as usual, before being al¬
lowed access to any files.
Fingerprint verification is now used only in some of the most sensitive
computer systems in the world, but assuming that the speed of tech¬
nology follows the pattern it has set in the past, more systems will be
able to afford fingerprint verification in the future. The units in use
today are already quite accurate, but no doubt these systems will be¬
come more and more accurate. Because of the element it checks, this is
one system of verification that will probably not apply to mainstream
telecommunications for quite a while.
Signature-verification techniques as a security measure seem to be
very promising, although they, too, probably will not be used with
telecommunications security for quite a while, if even Current sys¬
tems in use allow a person to enter an account name and then provide
a signature. The computer checks not only the look of the signature,
but also the amount of pressure applied and the speed used to sign
the name. Studies show that, because of the uniqueness and number
of these identifying features, even an accomplished forger can’t fool
the computer
Computer security is a matter of balance. If every house, bank, candy
store, or used-car lot were as secure as Fort Knox, life wouldn't be very
Voice
Verification
Fingerprint
Verification
Signature
Verification
KEEPING THE
BALANCE
T59
OUT OF THE INNER CIRCLE
easy. The same consideration applies to security devices. Each one
could, by itself, eliminate most of the security problems that are likely
to be encountered by most computer systems - but you have to use
any device correctly, and as it applies to your system and your needs.
A company that has not even used its password system ade¬
quately would probably find it a waste to move up to another system
of protection.
You have to pay heed to all aspects of security, and all aspects of
your security requirements, very carefully before investing in any se¬
curity device. In terms of making a choice, you should also pay close
attention to all aspects of the device itself. One program I ran across
that was operating under the Primos operating system shows a good
example of placing too much emphasis on colorful advertisements and
too little on critical evaluation of the product.
The programmer on the system involved was interested in an
addition to the operating system that allowed him to set up password
protection on all files. Before anyone tried to run, read, erase, or oth¬
erwise alter a file, that person would have to enter a password. This
system, said the advertisement, would provide a second level of pass¬
word protection. The security vendor even made sure to tell the sys¬
tem programmer to choose good passwords when locking up the files
that controlled the system.
This all sounds like a good idea, and it is. But the programmer did
not question the software patch enough before telling the company
that owned the computer to buy the addition. The software was set up
in such a way that it allowed anyone to obtain a printout of the entire
password file with one simple command.
Caveat emptor. It’s a caution that applies to computers as well as
cars - especially since high technology implies a high degree of com¬
plexity and requires a certain amount of background knowledge.
CHAPTER NINE
Microcomputers and Security
T.J
X JL ackers have a wide range of interesting machines to play
with - on any given day, an average hacker probably has access to over
a million dollars in computer equipment* Why, then, a chapter on se¬
curity and microcomputers? I can think of two good reasons: First,
with more and more people using micros every day, it is becoming
more important for users of these machines to think about the security
of microcomputer data and programs* Second, just because hackers
are not beating on the doors of your disk drive does not mean you are
immune to the need for security precautions. There are, indeed, in¬
stances in which hackers can become interested in microcomputers
(though perhaps these instances are more recreational than profes¬
sional), and there are instances in which a thief or some other intruder
might find an office microcomputer quite fascinating.
Three categories of people need to worry about security when
dealing with microcomputers: people who use microcomputers to ac¬
cess larger systems, those who use microcomputers in their business,
161
OUT OF I H E INNER CIRCLE
USING A MICRO
WITH OTHER
SYSTEMS
Autologon
Macros
and those who use microcomputers to run bulletin-board systems.
This chapter will look at the security needs of these types of users.
If you are like most people who use mainframes from a remote loca¬
tion, you use a microcomputer and a modem. A microcomputer used
as a smart terminal can do a very good job of helping you work with
larger systems, and it can provide much more power than a dumb
terminal. A microcomputer can save data sent from the mainframe to
the user; it can dial the computer and log the user on automatically; it
can transmit files from the user to the mainframe; and it can be made
to emulate different types of dumb terminals when necessary.
The only problem with using a microcomputer to access other
systems is that, as you will see in the following section, you can find
yourself “done in” by the same sophistication that makes your micro
so easy to use.
Autologon macro is computer jargon for a type of computer short¬
hand. Although it may sound technical, the term simply refers to an
AUTOmatic LOGON procedure that is stored as a MACRO which, in
turn, is simply a long sequence of keystrokes (commands) represented
and activated by, usually, a single keystroke.
Telecommunications software and other microcomputer pro¬
grams often enable users to store long strings of often-used commands
as one or a few keystrokes. For example, with one common type of
autologon macro, you simply tell your personal computer the system
you want to call by entering its name. The macro then has your com¬
puter dial the number, connect with the system, and enter your ac¬
count name and/or password. It may even check your mail and log you
off automatically. Autologon macros can be a great help, and I use
them whenever possible. Macros save a great deal of time and effort,
but they can also be a security risk.
The first and most common risk with these macros stems from
the fact that microcomputer owners frequently trade software. Sup¬
pose, for example, you use macros for telecommunications with a
computer on a network, such as THE SOURCE, or maybe with the
162
CHAPTER NINE Mkrocompuhn and Security
secure computer back in the home office. You’ve told a friend how
great your communications software is, and one day you copy the disk
for your friend to try. This is someone you trust, so you hand over the
disk without thinking anything of it. Think again. Your macros are
stored on that disk - phone numbers, account names, passwords. Of
course you can trust your friend, but what if your friend trades the
disk, just as you did? I have received terminal programs that have
moved through thousands of miles and at least ten people before they
reached me. And when they did get to me, they included secret ac¬
count and password information that had not yet been discovered or
used by other hackers.
Another problem with autoiogon macros is that hackers have
been known to be able to activate them from a remote location, either
via a bulletin board or over a mainframe. A hacker who ran a bulletin-
board system would be able to tell the smart terminal (by sending the
correct sequence of characters) to show him all the macros.
If you use a microcomputer for telecommunications and are an active
member of the bulletin-board community, there is another potential
risk you can eliminate with a little precaution: password security.
People who call bulletin boards usually have at least two or three
passwords to remember-bulletin-board passwords, mainframe pass¬
words, network passwords. With several to many passwords to keep
track of, it is very tempting to use one common password for all of
your accounts - both bulletin-board and mainframe. Many people, in
fact, do use the same passwords, even if they have only two or three to
remember. Hackers are well aware of this, and bulletin-board owners
are often sympathetic to hackers, so be careful. There’s no point in
using a private password to a secure system as a bulletin-board pass¬
word on a much less secure, much more public, system.
A business microcomputer poses its own types of security problems.
Because very few are even hooked up to the phone system, and almost
none are hooked up to networks, hackers very rarely try to get into a
business microcomputer. This same computer, however, may well be
Bulletin Boards
MICROS IN
SMALL
BUSINESSES
163
OUT OF THE INNER CIRCLE
Micros and
Hackers
Micros and
Passwords
open to theft of programs or data; so there are many aspects to micro¬
computer security in this area, as well.
The overwhelming majority of people who are qualified to work with
microcomputers are not active hackers, but hackers do get jobs work¬
ing with computers, because they are generally well qualified by
nature and, well, inclination for the work. If you gave such a hacker
free access to your system, he might be unable to resist the oppor¬
tunity and decide to do some of his “work” from your computer and
modem. If you didn’t have a modem, he might provide his own with¬
out bothering to tell you about it. His hacking would probably involve
setting up a program to scan phone numbers overnight or to execute a
hack-hack on some large system.
In any case, the hacker may not be as careful as he would be at
home, and if a legal problem happened to result, then you, as the
owner of the computer, could be held responsible. You should consult
an attorney for all the ins and outs in this rapidly changing area of the
law, but on a day-to-day basis, there are two precautions you can use to
try and avoid this problem in the first place: Limit use of the micro¬
computer and modem to certain people by using some type of lock
and key, or familiarize yourself with the work being done on the com¬
puter and watch the people using the computer so that you can spot
unusual activities quickly.
Microcomputers are well known for their lack of security, but in most
cases, since these are single-user systems, these computers don’t need
better security. There are cases, however, in which an operating sys¬
tem for a micro or a minicomputer has a password feature that is
spotlighted as a major security device but is one that turns out to be
very easily defeated. In some instances, if the hacker removes a floppy
disk at just the right moment, he can get around the password feature
altogether. In others, he may find it possible to read the password files
themselves, no tricks involved. It is more likely, though, that any of
the techniques explained in Chapter Five would be much more effec¬
tive and easy to use on most micros than on even the least secure
mainframe.
164
CHAPTER NINE Microcomputers end Security
It doesn’t take anyone long to walk up to a microcomputer and copy a
file or two over to a pre-formatted disk. It is even easier if the person
works in the organization and doesn’t have to look out of place. Be¬
cause of this, a thief would find it much less difficult to go after a
business with floppies he can access than a mainframe he would have
to call. With microcomputers handling so many jobs these days, a busi¬
ness that keeps any type of secret data on a microcomputer has to be
very careful in this regard.
A thief could, for example, copy the data to his own floppy disk,
change it in a way that helped him, and replace the altered floppy. Or,
he could just take the floppy and use the data to his own or a compet¬
ing company’s advantage. Whatever he might decide to do with the
data, one point is clear: The fact that users of the microcomputer have
no idea of what’s going on makes it easy to take or copy floppy disks. If
the users were more aware, the thief would have as much trouble
taking a floppy disk as he would taking a thousand-dollar bill.
Here are a few tips to keep in mind when managing a micro with
floppy drives.
Educate users. At the risk of sounding like a bore, I’ll stress this
point again. User education is the most important aspect of computer
security. I would guess that at least 90 percent of all computer crime
depends on the unwilling aid of people who don’t know what they are
doing. And wherever there are confused people, there are other peo¬
ple waiting to profit from their confusion.
Keep floppies under lock and key. Some owners of business micro-
and minicomputers keep a lock on the disk-drive door. This is a good
idea, but it is also important to have the floppy contents of the drive
locked away when they are not in use. And perhaps the most impor¬
tant thing to remember is: Keep the backups as secure as you keep the
originals. It’s funny, but some people guard their original disks as
closely as they can, but they leave their backups lying around like dead
leaves. I suppose there’s something very human in thinking that a copy
is a copy... is not an original. But we’re talking about computer data,
not Rembrandts. To a computer, a copy is a copy is an original, and the
moral is: Only the people who need to use any floppies need to have
the key to access them.
165
FLOPPY DISKS
AND SECURITY
0 U T OF THE INNER CIRCLE
Keep inventory. This precaution is so that you will know if one of
your disks is missing. An inventory can be your microcomputer equiv¬
alent of a mainframe user log, and if you keep records of who used
which disk, when, and for what job, it may also help you to find out
who took a disk without authorization, because you will have a good
idea of when it was taken and who had access to it at that time. Once
again, remember to treat backup disks or tapes as carefully as you do
your originals.
Data encryption. There are quite a few data-encryption software
packages available for microcomputers, and in many ways they could
solve the security problems facing microcomputer owners. If all data
were encrypted as it was saved, and then decrypted as it was read, all
data on any disk would be unreadable and unchangeable to a thief.
There are a few pitfalls involved with data encryption, however.
First, the key has to be closely guarded against both loss and discov¬
ery. A lost key could mean lost data because the key is not saved on
disk with the data, as a password is. In the worst case, suppose that the
only person who knew the key died. That data could be lost forever.
On the other hand, loss could also mean loss of data in the sense of an
employee who leaves your company on less than friendly terms - with
the key memorized - and goes to work for your biggest competitor.
Another pitfall is one that encryption has in common with pass¬
words: People choose keys that they can remember, and that hackers
can often guess.
Be conscientious about keeping backups. I don’t mean just backups
on disks or tape. Of course you need these, but you should always have
some kind of written record of all the transactions you make. The
computer has not yet replaced paper and ink; it has only made paper
and ink easier to deal with. Information stored on magnetic media is
very volatile and easy for someone to destroy.
Once again, you have to treat all your floppies as if they were
original data. In some cases, a thief will find it impossible to get to orig¬
inal floppy disks, but he can quite easily get to the backups. As I said
earlier, he could then do one of two things, depending on his motives.
He might create and alter a new backup in his favor and damage the
data disk being used (with a magnet, perhaps, or power surges or one
166
C H A P T E H N ! N E Microcomputer! and Security
of many other physical attacks). The company would find that its data
disk is damaged and be forced to use the altered backup. On the other
hand, of course, a thief could just back up the backup, take one,.. .and
no one would be the wiser.
At this time, small businesses that use microcomputers seem to have
more trouble finding employees to run computers than they do decid¬
ing on and buying the machines themselves. After spending 115,000
on a computer system and wondering what to do with it, they have
been forced to hire one person who “seems to know what he’s talking
about.” What follows is one person telling twenty other people how to
use the computer system.
In many cases, a situation like this will tempt the one person who
knows what he’s doing to use the system to his own advantage: keep
personal records on the system, or print personal letters. After all,
there’s no harm being done. In other cases, the person who knows
what he’s doing might find it very simple to print more paychecks for
himself or to have his expense-account check automatically padded
every month. This kind of crime is known to experts as “data did¬
dling,” and it is different from the “pure” variety of hacking that’s
primarily the subject of this book. Still, since there is no one to check
on these “diddles," they could go on for a long time without being
discovered. In fact, they have - with and without computers — for as
long as embezzlement has been a definable word.
Another thing that this type of “expert” employee usually turns
out to be good at is writing software for the employer. It would be a
very simple matter, however, for such an employee to throw a trap¬
door or two into his other programs - some software authors would. In
most cases the trapdoor would just be a little secret, not meant to
cause any harm, but put there for fun by the author. It could be,
however, that the author puts in a trapdoor so that he will always have
access to the accounting programs, or so that he can access the payroll
program whenever he wants to find out who is getting paid what. In
any case, once trapdoors are in your system, they can be almost im¬
possible to find without hundreds of hours of detective work by a
skilled and thorough computer professional.
Employee Risks
167
OUT OF THE INNER [ I R [ 1 E
BULLETIN Now we have come to the “recreational” side of hacking and micro-
BOARDS computers. Aside from such matters as password security, which was
discussed earlier, most business users will probably have little direct
interest in bulletin boards - their attraction is mainly social or profes¬
sional, rather than business related. Still, hackers use bulletin boards
for two interesting reasons: one, to communicate what they know, and
two, to crash the system and thus irritate a lot of people at once. The
first reason is more important to you as a user, owner, or operator of a
large computer. The second is, well, interesting for its own sake,
In order to understand how bulletin boards are used (and mis¬
used), you need to understand what they are and what they do. First,
we’ll look briefly at the ways bulletin boards are set up, used, and
maintained. Then, for those of you who have never seen a bulletin
board, I’ll show you two samples - one public and freely accessed by
anyone, and one private and for hackers’ use only.
Bulletin Boards A bulletin-board system, often abbreviated to BBS, is usually a per-
In General sonal computer equipped with a modem and special software that
allows people to call in and use the system. Often, the bulletin board is
set up and left permanently running as an open forum for anyone who
feels like calling in. In other cases, the bulletin board is open during
certain specified hours. In any event, a bulletin board is almost always
set up as a free service by a special-interest group that simply wants to
make such a system available to others.
A microcomputer—or any computer, for that matter—becomes a
bulletin-board system by virtue of its special program, which allows
the computer and modem to “listen” to a telephone line for a phone
call. Whenever an outside computer equipped with a modem calls the
telephone number of the bulletin-board computer, the BBS software
allows the host system to record input from the remote computer. In
many cases, the software can also transmit text or even programs to
the remote computer. BBS software is also responsible for keeping
track of messages that various users place on the bulletin board, and
most bulletin-board software offers options for both public and pri¬
vate messages-users can send private mail to one another or they can
post public messages for everyone to read.
168
CHAPTER NINE Microcomputers and Security
When people call bulletin-board systems, they are usually asked
to enter their names and/or some type of password for identification.
Since bulletin boards almost never charge for their services, this pass¬
word feature is designed to give the system operator some control over
who can and who cannot use the bulletin board. In every case I have
seen, this decision is made quite fairly. Only those very few people
who cause too much trouble by leaving tasteless messages or by trying
to crash the board are ever removed from the system. In those in¬
stances, the operator denies access to the trouble-maker by eliminat¬
ing the individual’s password from the list of valid entries stored in the
bulletin-board computer.
What do people leave messages about? Well, different bulletin
boards have different types of users and, therefore, different types of
messages. A majority of bulletin boards are meant to be as public as
possible, and list such diverse messages as “1978 Ford for sale” and
“Summer work wanted.” Some boards are dedicated to certain groups
of people. There are boards for people who want to discuss religion,
and boards for people who want to discuss making money. There are
bulletin boards for software pirates, school teachers, hackers, system
operators of bulletin boards, single people interested in finding dates,
people who like to tell dirty jokes.. .and even boards for people inter¬
ested in computers.
When people call a public BBS, the following sample shows the types
of messages they will see.
Welcome to the PCD Bulletin Board system
Please Login or enter “N” if a new user:
X7TLO
The user’s ID/password. The system welcomes him by name and tells
him he has mail. The user decides to read it....
Welcome Bill. It has been 3 days since
you last logged on. Yon have new mail.
Read it now? Yes
169
A Public BBS
OUT OF THE INNER CIRCLE
He is told who sent the mail, when it was sent, and what it's about ....
From: Bryan Brown On: 12/14/84
Subject: Mail
Bill,
You must have forgotten that 1 exist.
It has been several weeks since you have
left me any mail. Did you ever get Jim’s
phone number from Eric?
Don't forget to answer,
Bryan
The user is given a list of choices and decides to answer the letter ...
Save, Delete, Re-read, or Answer? Answer
The system tells him what to do. The system will address the message
for him , so he only needs to type the message itself.,.
Enter text now, 50 tines max. Hit
Control-Z to send, Control-C for menu.
Bryan,
Sorry, you must be talking to the
wrong guy. I don't think I know you.
Bill
He hits Control-C ( C) to see the menu and chooses to send his
letter ... *
C
Send, Read, Edit, Add, or Abort? Send
The user is shown another menu. He decides to delete Bryan's
message, and tells the system he doesn't want to send any more
mail ....
Save, Delete, Re-read? Delete
Send any more mail? No
Now, the system puts the user in the main part of the bulletin board.
He is once again given a menu to choose from....
170
CHAPTER N I H E Microcomputen and Security
MENU OF FUNCTIONS
A:: Tips far Apple Owners
C:: Call Sysop for Chat
E:: Enter Electronic mail section
F Leave Feedback for Sysop to read
I ;; Tips for IBM Owners
K:; Kill a message
O:: Off - Hang up
P :: Post Message on Public Board
S ;; Scan or Read Public Messages
T :: Tips for TRS-80 Owners
U:: List of Users on the PCD BBS
XTurn Expert mode ON
He is experienced with this bulletin board f so he turns expert mode
on to get rid of the menus. ,..
Enter Option: X
The systejn responds and asks what he would like to do next. He
decides to scan/read the public messages....
Expert mode now >ON<
Option: S
He requests a list of messages, starting with number 25. The system
shows him the number ; topic ; and writer's name for each one ....
There are 31 messages.
Start at message #: 25
25 : Double Siders Jim Elits
26: X-rays Steve Burlap
27:1 Did! Dan Gaylord
28: Movies Mort Smith
29: A Boat Ride Peter Zen
30:1 Resent That! Peter Rollouts
31: Hello? Kerry McFarl
He decides to start reading at message #26.
171
OUT OF THE INNER CIRCLE
Number to read or "Q” to quit?: 26
Message 26 Posted on 12-12-84
Re: X-rays By Steve Burlap
Is it true that if you place your cat
next to your monitor you can see right
through it? I hear that albino cats
work best.
End of message #26
He decides to read the next one ....
Number to read or “Q” to quit?: 27
Message 27 Posted on 12-12-84
Re: I Did! By Dan Gaylord
I tried it once, but a knife works just
as well and is cheaper,
Dan
End of message #27
A response to a previous message.
Once again , he reads the next message....
Number to read or “Q” to quit?: 28
Message 28 Posted on 1243-84
Re: Movies By Mort Smith
Has anyone seen any good movies lately?
How about “Godzilla Meets The City
Slicker”? is that any good?
Why don't you guys keep me posted
on movies anymore?
End of message #28
And the next .,,,
Number to read or “Q” to quit?: 29
Message 29 Posted on 1243-84
Re: A Boat Ride By Peter Zen
I saw “Godzilla Meets The City Slicker”
172
{NAPIER NINE Microc omputen and Security
and thought it was okay, as far as movies
from Taiwan go. They have no imagination.
End of message #29
the next . . .
Number to read or “Q” to quit?: 30
Message 30 Posted on 1243-84
Re: I Resent That! By Peter Rollouts
I have a friend from Taiwan {his
name is chuck) and he seems to have a lot
of imagination. He poured red paint over
his older brother's head!
End of message #30
and the last ....
Number to read or “Q” to quit?: 31
There are always a few new people on the boards. But
they get the hang of it soon ....
Message 31 Posted on 12-13-84
Re: Hello? By Kerry McFarl
Does this thing work? Can anyone read
this? Damn.
EXIT
FINISHED
HELP
End of message #31
Now that he has read all the new messages f he quits and chooses
a new option, P, so he can post a message of his own ....
Number to read or “Q” to quit?: Q
Enter Option: P
POST MESSAGE
Message title: Okay Kerry
Enter message now. No more than 30 lines,
enter “/EXIT” on a new line when done.
173
0 U I OF THE INNER CIRCLE
We can read you loud and clear, the
question, I think, is can you read us?
/EXIT
He follows the directions and chooses the send option. The
system tells him the message has been posted, and he decides
to log off for now....
Send, Read, Edit, Abort: Send
Message #32 posted.
Enter Option: O
Are you sure? YES
— -Thank you for calling the PCD BBS- -
Call again soon!
You can see that public bulletin-board systems, like this one, are
available to everyone, for whatever purpose they like. The operators
of these systems usually encourage any type of discussion, with the
exception of exchanging possibly illegal information.
A Hackers’ BBS The next sample will give you a glimpse of what you are likely to see
on a typical hackers’ bulletin-board system. The operators of these
systems try for a bit more security than the operators of average bul¬
letin boards, but since the members are not expected to give their real
names or phone numbers, the security really isn’t very good. In fact, it
quickly becomes hard to tell whether someone is using the board un¬
der one name or thirty. It is also usually very difficult, if not impossi¬
ble, to tell what a person is like or who he - or she - is from a handle
alone. To show you what I mean, here is a typical example of the user
log of a hackers’ BBS:
THE ANIMAL
ELBANDITO
CAPTAIN CROOK
SHORT FUSE
SIR HOAGY
TOM LAWLESS
HACKERS ANONYMOUS
MR. BIG
JOHN D. HINCKLEY
THE GHOST
BLACK KNIGHT
THE LODE RUNNER
DR. ATOMIC
FLORIDA CRACKER
PROFESSOR FALKEN
MAJOR HAVOC
KAR1 LARSEN
AUTO MAN
174
C H A P T £ fl NINE Microcomputers and Security
SAND MAN
THE OUTRIDER
MIKE SMITH
TOM SMITH
THE VICTOR
MASSIVE MAX
THE SCORPIO
STAN SMITH
THE SPAZ
THE WASP
THE MONITOR
THE SKEPTOR
STEVE SMITH
THE TYPIST
THE ZAP
Now, here are some typical messages from a hackers' BBS. Of course,
names and numbers have been omitted, so they don't apply to anyone
real. Many of the messages may strike you as confusing or technical
and not too exciting, so my comments will try to explain what these
hackers are talking about.
fust as hackers are known by their handles, so are bulletin boards . The
County Jail is the name of this board-it s typical of a hacker BBS '.
Some computers, by the way , do not display lowercase characters.
All text on this computer is uppercase only ,,,
YOU HAVE JUST ENTERED THE COUNTY JAIL
(SHOW YOUR BADGE OR TYPE: “NEW" __
ON-LINE: THE CRACKER
::::: WELCOME TO THE COUNTY JAIL :::::
DISCLAIMER:
THE SYSOP OF THIS BOARD CANT BE HELD
RESPONSIBLE FOR ANYTHING POSTED BY ITS
USERS. SORRY GUYS.
YOUR LAWFULL FRIEND,
\_\THE SYSOP \_
/ /=-=- = - = - = -*=/ /
NO MAIL WAITING, SORRY
There is a secret level on this BBS. A user has to type A LBA NY
and a secret password to get to it. Other sections of this board would
look a lot like the public BBS shown earlier ...
(?- MENU) COMMAND: ALBANY
PASSWORD?: XXXXXX
175
OUT Of THE I N J* E R CIRCLE
The hacker decides to read messages, beginning with #1. This mes¬
sage is about a computer, GIZMO , that can be accessed by the phone
number and codes given by the hacker.
The # character used here replaces the digits of codes that would
actually be posted on this BBS .,,.
—>THE UNDERGROUND BOARD ACTIVE <—
TITLES, READ, QUIT; READ 1
MESSAGE #1: GIZMO!
(SPACEBAR QUITS MESSAGE)
MSG. LEFT BY; HACKERS ANONYMOUS
] GUESS TRI-STATE MANAGES GIZMO SO TO
USE GIZMO, CALL 555-0000 USE CODE ######
OR ###### LATER,
H.A.
PS DOES ANYONE KNOW IF GIZMO IS
A PART OF TRI-STATE?
HOW ABOUT GETTING SOME MESSAGES POSTED
ON THIS BOARD - PEOPLE - THANXI
The system tells the hacker there are 25 messages. The hacker re¬
quests message #2. This one tells him he can access a u stock quotes "
system by calling 555-0000 , entering the account name PALS,
and the passzvord 66C3P43V Whoever left the message did not leave
a “name ”*...
(1-25, LAST =X QUIT = Q) READ MSG.# 2
MESSAGE #2: STOCK QUOTES
(SPACEBAR QUITS MESSAGE)
MSG. LEFT BY: ANONYMOUS
TO ACCESS STOCK QUOTES:
CALL 555-0000, AT THE PROMPT ENTER
"PALS” PW= ‘66C3P43V’
COME ON LETS GET POSTING!
FD
176
CHAPTER HENE Microcomputers and Security
The hacker requests message # 3 ....
(1-25, LAST = 2, QUIT = Q) READ MSG.# 3
Its about a system named TREE-HOUSE. Someone named
THE PURE A K has found two more codes....
MESSAGE #3: MORE TREE-HOUSE
(SPACEBAR QUITS MESSAGE)
MSG. LEFT BY: ANONYMOUS
SOME MORE TREE-HOUSE CODES ... ID RICK94
ID RAY84
MORE LATER ... THE
>-PHREAK-<
(1-25, LAST—3, QU1T — Q) READ MSG.# 4
This message, again from THE PHREAK , now asks for a little
help ... *
MESSAGE #4: LOCAL CRAN
(SPACEBAR QUITS MESSAGE)
MSG. LEFT BY: ANONYMOUS
DOES ANY BODY KNOW THE CRAN CODE LOCAL
TO NEW YORK? PLEASE HELP ME, THANX,
THE
>-—PHREAK—<
(1-25, LAST-4, QUIT - Q) READ MSG # 5
A message giving some (altered) network addresses _
MESSAGE #5: MORE CONNECTIONS
(SPACEBARQUITS MESSAGE)
MSG. LEFT BY: ANONYMOUS
HERE ARE A FEW ADDRESSES FOR MEGANET:
###... DILL A INC. ###.,, NETPRI
###... PRLTEX ###... PR1-TEX-A
###... AUTOSL ###... IBM 370
177
out OF T H £ I N H E ft CIRCLE
###... E.L. MANAGER
###... D-C ARE I
###... DITYSYSTEM
###... A.RL. SYS
###.., ?? IBM/370
###, X-C-A TEST
###...?? (VAX)
###... IRN DUST
###... PSW>SYSTEM
###(ALNA SR)
(1-25, LAST = 5, QUIT = Q) READ MSG,# 6
Here, some phone numbers and a little information about
what system is on the receiving endWhite Nile is another
hackers' BBS....
MESSAGE #6: MISC PH
(SPACEBAR QUITS MESSAGE)
MSG, LEFT BY: ANONYMOUS
HERE IS SOME JUNK I JUST RAN ACROSS:
000-555-0000 3 CODES NEEDED TO GET IN
000-555-0000 TESTLINK
000-555-0000 LON DIST12 A
000-555-0000 O-TEST E-D
000-555-0000 MET COMPUTER
000-555-0000 CTCF SYSTEM
000-555-0000 S,H,L COMPUTER
000-555-0000 FLAT, SYSTEM TWO
000-555-0000 NE-IND 12
000-555-0000 WHITE NITE
GET POSTING!
(1-25, LAST = 6, QUIT = Q) READ MSG.# 7
Back to GIZMO. Once again the # replaces the digits of real codes.
The hacker cautions others to use the old codes first, however ; to
lengthen the lifespans of both the old and new codes _
MESSAGE#?: THE PHREAKS!
(SPACEBAR QUITS MESSAGE)
MSG. LEFT BY: ANONYMOUS
WHERE ARE ALL THE PHREAKS!? PS. I HACKED
178
CHAPTER NINE Microcomputer! and Security
SOME MORE GIZMO CODES LAST MIGHT AND
HERE THEY ARE:
###### ###### ###### ###### ######
###### ###### ###### ###### ######
DON’T USE THEM UNTIL THE OLD ONES DIE!
THAT WAY WE WILL HAVE CODES THAT WORK
FOR A LONG TIME. COMPRENDE?
HERE ARE THE OLD ONES THAT STILL WORK:
###### ###### ###### #######
USE THEM IN ORDER! OK???
(1-25* LAST = 7* QUIT-Q) READ MSG.# 8
Just after message #7, someone had asked whether ######
was still a valid code for GIZMO . . ♦ *
MESSAGE #8: WHAT ABOUT?
(SPACEBAR QUITS MESSAGE)
MSG. LEFT BY: ANONYMOUS
WHAT ABOUT ###### FOR AN OLD GIZMO
CODE???
(1-25* LAST = 8* QUIT = Q) READ MSG.# 9
Ah iuiHtafiofi. «, “conferencing” is a kind of free-form electronic
meeting of hackers andphreaks who all get on the same circuit, so
they can all speak to one another-sometimes in groups of up to
twenty at a time . AE stands for ASCI l Express t a BBS for trading
Apple software ....
MESSAGE #9: CONFERENCING
(SPACEBAR QUITS MESSAGE)
MSG* LEFT BY: DR. ATOMIC
IF ANYBODY WANTS TO GET IN ON SOME COOL
CONFERENCING* LEAVE ME YOUR VOICE # AND
WHO TO ASK FOR AND PLLG1VE YA A CALL,
OR LEAVE A MESSAGE ON MY AE LI NE
(555-0000) ... WE USUALLY RUN 2 OR 3
179
0 U T OF I H £ INNER CIRCLE
CONFERENCES A DAY, BUT WE CAN MAKE
ROOM FOR MORE, ... + DR, ATOMIC +
(1-25, LAST-9, QUIT = Q) READ MSG,# 10
Here are a few numbers that were found by a hacker using a modem
and a scan program. He offers speculation as to their purpose ,,..
MESSAGE #10: STRANGE COMPUTERS
(SPACEBAR QUITS MESSAGE)
MSG, LEFT BY: ANONYMOUS
HOW ABOUT SOME HELP WITH A FEW NUMBERS
MY SEARCH PROGRAM CAME UP WITH:
(IF YOU KNOW ANYTHING ABOUT THEM, JUST
LEAVE A MESSAGE)
555-0001 BELL TEST SIGNAL?
“ -0002 1200 BAUD?
H -0003 (???) "E GETS A.B.
rt -0004 CARRIER BUT??
w -0005 1200 BAUD ONLY?
" -0006 1200 BAUD ONLY?
“ -0007 (??) TRY HITTING TOUCHTONES
“ -0008 STRANGE COMPUTER
“ -0009 1200 BAUD ONLY?
“ -0000 1200 #$% ! !!#__
-CARRIER LOST =
Oops , The hacker got disconnected. Bad telephone connections do
this at times....
BULLETIN- Bulletin boards provide a valuable community service to all modem
BOARD users. They allow people to meet and exchange ideas or information,
SECURITY or just to talk and socialize. Even though hackers who bother bulletin
boards are generally looked down upon by other hackers, sometimes
a bulletin board is still disrupted.
Most hackers would not find it too exciting to crack a bulletin
board — the computer involved is probably no bigger than their own,
180
CHAPTER NINE Microcomputers and Security
the security is not all that great, and bulletin boards are run by dedi¬
cated computer hobbyists. People who haven't thought much about
this, however, and who haven’t actually tasted “real" hacking some-
times make this effort. But if a slight effort is made by the system
operator, the odds are that any hacking act ivity could be averted—and
this would be a great relief to many users of bulletin boards.
The problem with security on bulletin boards is that there are
Crashers in the world, and most Crashers love to crash bulletin-board
systems. When a Crasher crashes a bulletin-board system, he tries
either to break out of the controlling BBS software or to get the system
operator’s password. In the latter case, as with many mainframes,
password assignment is a security problem with BBS software. On
some bulletin-board systems it is essentially no problem at all to guess
the system operator's password, because of the well-known proce¬
dures used to assign it. Other techniques Crashers use on bulletin-
board systems include entering an unexpected character in the right
place (or the wrong place, depending on your point of view), entering a
number that is too large for the system to handle, or overflowing the
disk space by entering too many messages. Any of these tricks may, in
a crashable BBS program, send the Crasher an error message and the
system prompt... at which point he will have control over the com¬
puter system itself.
When the time comes, the Crasher will probably bring about his
moment of glory by formatting the disks that are currently on the
system, and since formatting a disk automatically erases all informa¬
tion on it, this means all messages that have not been backed up (in
some cases, this is all of them) will be lost forever. Also, if the system
operator does not have his bulletin-board software backed up, it too
may be lost. If the Crasher is more inclined to be subtle (Crashers are
not known for this), he may slowly start introducing problems into the
BBS. In any event, and particularly if the BBS uses a hard disk, the im¬
portance of backups should be obvious.
The remaining few pages of this chapter are directed primarily at
a fairly narrow group of people: the operators of bulletin-board sys¬
tems. But even if you are not associated with bulletin boards at all, I
think you will still find this information interesting. At the very least,
181
OUT OF THE INNER (TRUE
you will learn more about the ways in which hackers and operators
play off against one another. Here, then, are a few points to bear in
mind on keeping bulletin-board systems secure,
fs it worth keeping secure? First of all, obvious as it sounds, think
about whether the board is worth the effort. Some people run bulletin
boards as a light hobby and don't want to spend very much time or
work on security. That's fine, because a bulletin-board system really
may not be worth the trouble of keeping secure, and certainly would
not be worth an encryption scheme or a callback modem. On the
other hand, if the information on the bulletin board has professional
or other value, you would at least want to be certain that regular back¬
ups are made.
Don 't follow a predictable pattern in assigning passwords. Password
assignment procedures on bulletin-board systems are known to be
quite poor. For example, a typical bulletin-board password might not
even contain any random characters a hacker would have to guess at.
Some of these passwords look just like the X7TLO password I used in
the public bulletin-board example. At first glance, X7TLO might look
as random as anything, but another password on the same system
might be X43TLO. A quick examination of the bulletin-board pro¬
gram would tell any hacker that the passwords all consist of X, fol¬
lowed by a user number, followed by TLO. On such systems hackers
also know that the operator is almost always user number 1.
Most systems using this password-assignment format now make
one or more of the letters random. One random letter is no problem to
hack; two or three are substantially more difficult in terms of time and
the number of possible combinations.
Other systems have the users choose their own passwords - a
good procedure, as long as they choose reasonably difficult ones to
hack (as TVe already mentioned many times). A few bulletin-board
systems either don’t use passwords or they make passwords optional.
These systems are “open books" to hackers.
Filter the input . Most BBS software available today is fairly diffi¬
cult to crash, but there is at least one in which it is possible for a hacker
to use a control character in the title of a message. When the program
tries to read the message, it crashes. This vulnerability can easily be
182
CHAPTER NINE Microcomputers and Security
fixed by “filtering” the characters that are input, so that only the dis-
playable characters and the few necessary control characters, such as
the end-of-line marker, are allowed to get through. This filtering might
require some programming ability, since the operator may have to
write a routine that would tell the computer, “Look at all input; allow
this, this, and this character to get through, but trap any of the follow¬
ing characters...
Make extensive use of error traps. The goal of a bulletin-board
Crasher is to cause an error in the microcomputer, because he hopes
that the computer will stop the current program, revert to the oper¬
ating system, and give him the system prompt. In most languages,
however, there is a way to trap these errors and keep the computer
from turning control over to the Crasher. For example, in almost all
versions of BASIC, there is a command called ON ERROR GOTO that
works very well in most of these situations by telling the program to
GOTO a special part of itself {an error-handling routine) that traps and
takes care of errors rather than allowing those errors to cause prob¬
lems and stop execution of the entire program.
Crash your own system. The only way you can really ensure that
no Crasher will crash your system is to try crashing it yourself. I know
of one sysop who set up his program and put messages up on all the
other bulletin-board systems, tempting people to try attacking his sys¬
tem. After several weeks of this testing, he knew where all the weak¬
nesses in his system were. By keeping track of all the tricks that the
various Crashers had used to crash the system, he could fix these
problems and use his program comfortably to run a public board with¬
out fear of it being crashed.
There is quite a bit of debate going on regarding bulletin-board sysops
and the extent of their responsibility for their users. The whole issue is
part of a rapidly changing area of the law, and system operators to¬
day have to be very wary of how their users use the bulletin-board
services. Some bulletin-board system operators have had their sys¬
tems taken away by the authorities because of illegal messages placed
on the system by users. Others have been threatened with felony
charges. BBS operators have been subjected to arrest and the first
Bulletin Boards
And the Law
183
OUT OF THE INNER CIRCLE
stages of criminal prosecution, and in every case I know of so far, they
have been given back their equipment before the case has gone to
court. At this rate, as long as these cases are kept out of the courts and
no judicial decision is handed down on the subject as a whole, raids on
system operators can, and probably will, continue.
For myself, I feel that system operators who have their bulletin-
board systems and equipment removed are being treated improperly.
At times, they have their multithousand-dollar systems - which may
be used for schoolwork or business, as well as a BBS - taken away for
over a month. All because some unknown person placed a piece of in¬
formation that is considered illegal on a bulletin board. 1 believe the
system operator should not be held responsible for the acts of others,
whom he doesn’t even know. On the other hand, I must also admit
that, as the proprietor of the system, the operator does have at least
the right, and perhaps the obligation, to scan the board for illegal or of¬
fensive public postings he can then take steps to eliminate.
CHAPTER TEN
Telltale Signs
w
* * hat with logic bombs, Trojan horses, decoy programs, tele¬
phone tricks, and all the other little techniques hackers know and use,
you may, by now, think that there is no possible way to track down a
good hacker. I’ve deliberately taken care to tell you about a lot of
things that might be wrong with your computer security - things that
might also seem difficult, if not impossible, to detect.
Owner, operator, or user of a large system, you may feel you are
up against a new game: hacker-in-a-haystack. After all, even small or
medium-sized systems contain a considerable number of files and are
accessed a relatively large number of times every day by a variety of
users. If you are working with a very large system, the problem can be
magnified enormously. How can a system operator be expected to
examine every file, every user, and every remote access? If this is close
to what you are thinking, I’ve succeeded in expanding your awareness
of computer security. Now it’s time to see how you can take the ini¬
tiative. Here’s your advantage: Hackers leave footprints.
185
OUT OF THE INNER C I B C t E
TURNABOUT IS
FAIR PLAY
HOW THE USER
CAN HELP
Unless a hacker expends quite a bit of effort while demonstrating a
high level of skill, he can't help but leave signs of his presence. Even in
those cases where he could be a hundred percent undetectable, no
hacker is going to bother becoming invisible. The sysop of the system
under attack is the person who concerns the hacker the most, and in
the real world ... some sysops don't care about security, others are
very busy, still others think hackers are a bunch of kids who overesti¬
mate their own importance, and others (especially in the academic
world) sympathize with, at least, the Student hacker's addiction to
computers. So, whether the hacker's footprints consist of unexplained
miscellaneous files, altered information, or strange communications,
hackers rely on the fact that these signs will go unnoticed* They are
correct about eighty-five percent of the time*
This fact can work in your favor if you use your computer's log
files often and educate your users so they can help you look for the
danger signs. The average hacker is going to be, at the very least,
slightly careless on your system, because he isn't used to people actu¬
ally caring about security. Use his trusting nature to your advantage.
Hackers often give uneducated users all kinds of unusual signs and
signals that they never even notice. At times, the way these signs are
scattered all over the place, it seems that the users must be tripping
over them constantly. If users knew what to look for, how to look for
it, and what to do once they found it, there would be a much better
chance of keeping hackers off the system. To help users, here are some
“footprints" a user should look for.
Excessive log-on times * In many companies, employees do not
have to charge their computer time to a specific project or even ac¬
count for it. Sometimes, they are not even told how much time is spent
on their accounts, and some never seem to use their authorized ac¬
counts. Because of this, if and when the employee logs on, he or she
may not notice unauthorized activity on the account, even if the sys¬
tem displays the last log-on date, or the length of the last session*
Hackers know they can use such accounts for days at a time
without the user noticing or keeping track of how often the account is
186
(HAMER TEN telltale Sign
used. For example, I remember one account that was heavily used by
hackers. If the system, which had built-in accounting software, had
charged the computer time used to one or more tasks or projects au¬
thorized on the user’s account, it would have cost under $50 a month
in most cases. Of course, this wasn’t most cases. Hackers started using
the system and adding up computer time which, as far as they were
concerned, was free. Before too long, the monthly charge would have
been over $5000 if anyone or anything had kept track. But because the
user did not have to account for this time or charge it to an authorized
job, he never had any idea. On the other hand, how could he?
Files that have been moved, deleted , or otherwise altered. No mat¬
ter what his objectives, many of the things a hacker needs to do require
modifying existing files. In almost every case, users don’t notice the
alteration of a file or two. These little alterations, however, can aid a
hacker. They may, for instance, at some later date, result in triggering
a Trojan horse that may change the user’s password to something the
hacker knows, and thus allow the hacker to log onto the user’s account
even after the user changes his password. Altered files could also be
used to store information, so that the hacker would not have to create
new, possibly detectable, files. At any rate, if there is a file on a user’s
account that has not been used in eight months, a hacker will feel fairly
safe in altering it to use himself. Again, as I’ve said so often, user edu¬
cation is the key to avoiding this problem.
In addition, hackers can sometimes copy all of the important sys¬
tem files into the directory they are using so it is easier to learn about
t he files. Hackers may also copy files that interest them in other ways,
again so they can look at all the interesting files without having to
move around the system all the time.
The most likely type of file that a hacker will want to copy,
however, will be “source files,” if they are available to him. A source
file is a text file that contains a computer program. The program, at
this point, can be read and modified by a programmer, but to become
“readable” to a computer, it must be “compiled” by a special program
known, appropriately enough, as a compiler. Once a source file is com¬
piled, it becomes a program that can then be run on that particular
computer. A programmer writes programs by writing a source-code
187
OUT OF THE INNER CIRCLE
file and having this source code compiled. The source code is kept, and
if any changes need to be made, they are made on the source code,
which is then recompiled into a newer version of the program.
The hacker can take a source file and do one of two things: First,
he can alter the file as a Trojan horse and recompile it. Second, he may
simply be able to compile the program and run it himself. This may not
sound valuable in itself, but it’s possible that the hacker does not have
the power to run the actual program. If he takes the source file and
recompiles it, however, that sometimes opens the door for him.
Fites that have been added. Hackers often need to create files.
These files might consist of programs that store information {or pass¬
words) or access various sections of memory, such as password buff¬
ers. Or, they might contain any of the programs that hackers use to
obtain access to accounts. Unfortunately, most users are still some¬
what computer timid, and will assume that they should not touch any
files, even in their own accounts, that they didn’t create. It’s also likely
that users will shrug off the existence of those files - even if they have
such obvious names as PASSWD.HAK or HACKER.
On the other hand, funny things can happen when a user does
get curious, too. Earlier in the book, I told you of a hacker who used a
file named TOP SECRET as bait - everyone who tried this file was
treated to a silly message and, unwittingly, helped the hacker find his
or her password. In a similar instance, there was no bait, but l know a
user who did wonder about some strange files listed under his direc¬
tory. Among them, he found one called PASS1, so he decided to try it.
He typed PASS1, and then assumed something must not be happening
correctly, because all the file did was display WORKING.. .on the
screen. He didn’t realize that, in typing the file name, he had started a
program that was busy trying to get the system operator’s password.
Directories that have been added. To hide a number of added files
he wants to keep, a hacker may create a subdirectory within a user’s
directory. The hacker’s subdirectory would be unobtrusively named,
perhaps with only a single character, or “hidden” if the system allows
such things to be done. Then, too, some systems allow non-printable
characters as file names. These, of course, while they would be part of
a directory, would not be displayed or printed as visible characters.
188
(NAPIER TEN hlltiie Signs
Older versions of a file. Some systems allow a user to keep several
different versions of a file under the same file name. When a user tries
to run, type, or edit the file, the system automatically chooses the
newest version, unless the user specifies another. A hacker can use this
feature to his advantage by giving his subdirectory or file the same
name as an existing file belonging to the legitimate user. But the
hacker would give his file an earlier version number. The result would
be that anyone wanting to use the hacker’s version would have to
request it specifically. For example, there can be two different files,
both called NOTES. One of them, NOTES;2, may be the user’s daily
notes to himself. The other, NOTES;1, could be the hacker’s file. If the
hacker wants to use his version of NOTES, he simply tells the system
to use the version NOTES; 1.
Strange electronic mail Hackers may use two or more accounts to
communicate among themselves. If the hackers know what they are
doing, they stick to accounts that are unused. If the hackers don’t know
what they’re doing, they sometimes communicate through accounts
that are being used regularly by their rightful owners. In this case, a
message meant to be read by a hacker may be sent to a user, instead.
Almost always, though, a user will simply answer the strange mail
with 1 DON’T UNDERSTAND or YOU'VE GOT THE WRONG PERSON.
This warns the hacker that the account is in use.
Most systems also have a special program that allows two or
more people to carry on a conversation through their terminals.
Hackers like to use these programs too (and may create their own, if
none exists) to communicate with each other. Sometimes a hacker
inadvertently contacts an authorized user, who may be surprised by a
message like JOE? IS THAT YOU?The user often assumes the message
is a mistake and ignores it, although such an incident is even harder to
explain if the message is MR. MIDNIGHT? IS THAT YOU?
Lost or pre-read electronic mail. Sometimes hackers read a user’s
electronic mail, so this is another “footprint” users can learn to watch
for. Most electronic-mail systems have a feature that gives the user a
list of all the mail that has not been read. If a hacker reads the mail
first, the user may never see his new mail, because the system will
keep saying that there is none. And even if the user goes back, checks
189
OUT OF THE INNER CIRCLE
old mail, and finds messages that look unfamiliar, the user will usually
just assume that the computer messed up or that he or she has forgot¬
ten what was there. It is quite possible on most such systems to read
someone else’s mail and keep the system from changing the status
from “new mail” to “old mail,” but most hackers wouldn’t bother,
simply because most hackers don’t say anything, anyway.
The Oversmplified As something of a side issue, sometimes a user who links up with a
System network computer doesn’t notice signs of hacking for a very simple
reason, despite the fact that the hacker who uses the person’s account
thinks the user must be blind; The user’s machine does too much auto¬
matically. A user may have a personal computer set up as a smart
terminal and, literally at the push of a button, he or she can simply tell
the terminal, “Bring my new mail back to me and send this mail out to
these people.” The terminal will then call the system, enter the user’s
name and password, issue the commands needed to retrieve all of the
user’s incoming mail, and issue the commands needed to send all of
the outgoing mail to other users.
Such a system is usually set up by a consulting company that ad¬
vertises an electronic-mail system so simple that anyone can use it
with no expensive training, To back up its claim, such a company does
not teach the user anything more difficult than how to turn on a termi¬
nal and hit a few appropriate keys.
Granted, such a “smart” terminal is a boon to the busy user, but
in these cases, there is not much chance of the user spotting hacker
activity, because he or she never sees anything of the procedures in¬
volved in logging on and off or sending and receiving mail. Because the
password is stored in the personal computer, the user may not even
know it exists, much less have any idea about how to change it. The
user may not even realize that the actual mail computer is hundreds or
thousands of miles away. If asked, the user might guess that, somehow,
the microcomputer handled it all.
This type of an overautomated system has one additional re¬
quirement beyond user awareness of the hacker "footprints” I’ve men¬
tioned. To the point of redundancy, educate the user. Assume that this
person is interested in the technology being used - perhaps not at the
190
CHAPTER TEN lelilale Signs
level of bits, bytes, or BASIC, but almost certainly at the level of how
the call is originated, how the main computer recognizes the user, or
how one person’s mail is kept separate from everyone else’s, and so on.
The more comfortable people are with the equipment they use, the
more likely they are to notice idiosyncrasies that occur, and the more
likely they are to use the equipment correctly.
Users should be told whom to see if they notice any signs of hacking on
their accounts. The system operators need this feedback, for one thing
because they may already be in contact with the hackers. If they know
more about the hackers’ activities, or are told that they are destroying
data, the system operators may be in a good position to monitor the
hackers, remove their accounts, have them traced, ask them to leave,
or take further steps to make the system less accessible.
It may be dangerous to tell a user to change his or her password
and forget the matter, because in some cases, it is simple for a hacker to
alter the command that changes a password. Instead of just changing
the password, the command will record the request to change the
password, record the new password, and store the information in a file
for the hacker. The hacker may then log on later, read the file that has
recorded both the request and the new password, and change the pass¬
word for the user. This trick works well for the hacker. Not only does
he learn the new password, but if the user tries to log on again, before
the hacker has a chance to change the password, the user always tries
his old one. I am not telling users not to change passwords, but I am
saying that they should also notify someone about it.
No matter how well educated they are about security, some users will
continue to miss the signs that hackers are using their accounts. Some
may also teel that it is not their job to spot hacker activity - that the
role belongs to the system operators, and that users aren’t properly
trained. To some degree, they’re right, but it is a dangerous attitude
from the computer owner’s point of view. After all, in an analogous
situation, the police do what they can to keep intruders out of a house,
but the final responsibility rests with the people who live there.
Taking the
Initiative
THE SYSTEM
OPERATOR’S
ROLE
191
our of rut inker circle
Fortunately, with most systems, the security-conscious system
operator/programmer/security manager should have little trouble in
spotting a hacker’s footprints. Here are some tilings to look out for.
They fall into two categories: everything discussed to this point... and
then some.
Hacker signs already mentioned. An operator is a user before he’s
an operator. Whether he simply watches his own account or takes it
upon himself to watch or spot-check other accounts, he should watch
for the signs I have listed for users as if he were a user himself. System
operators can be almost as blind as users in some cases, and they don’t
have any excuse.
There are, by the way, some system operators who allow hack¬
ers limited use of a computer system as a way of keeping them under
control. These operators are not the same as those who do not see the
signs of hackers. I’ve known of some very, very good system operators
who have allowed hackers limited use of their systems. As far as I can
tell, none of these systems suffered any damage as a result.
An overused account. If hackers have access to only one or two
accounts on a computer, there are likely to be two or three hackers on
the same account at any given time. Five or ten at a time is not rare,
and even twenty would not surprise me. As I mentioned in an earlier
chapter, a hacker can often break one account into several sub¬
accounts. In addition, hackers could run a bulletin board off your
mainframe, allowing ten, twenty, even thirty people at a time to use
the board - and all of them would be logged onto the same account. A
system operator is in a very good position to see and act on this type of
activity, but it’s surprising how often hackers manage to get away with
such group-access times.
A few systems help control this type of situation simply by limit¬
ing the number of people who are allowed to log onto an account at
one time. And one system I know of automatically shuts down an ac¬
count if more than five people are logged on at one time. When I last
checked in, this system had not yet closed down on an authorized user,
but it had closed down on several hackers. If nothing else, this type
of system would make hackers become very careful of the number of
people using one account.
192
CHAPTER TEN telltale Signs
Unusual times of activity. Hackers are well known and well pub¬
licized for their strange hours of activity. Any unusual activity times
should be questioned. Bear in mind, though, that hackers don't always
hack in the middle of the night. Depending on normal patterns of use,
in some cases, activity during a lunch hour should be regarded as odd.
In one blatant example I know of, a system normally had an aver¬
age of three users between 8 p.m. and 8 a.m. and an average of thirty-
five users between 9 a.m. and 6 p.m. The system operators didn’t
seem to notice anything - or at least they didn’t do anything - even
when hackers started raising the average 8 p.m. to 8 a.m. figure to just
under twenty users. It should have been quite clear what was going on.
Users of certain accounts going to strange places. If someone using
a word-processing account is wandering around the accounting files,
the password file, and the operator’s files too much, question the per¬
son assigned to the account. Hackers like to move around, seeing as
much of the system as they can, while users generally have plenty to
do just dealing with their own work. Thus, hackers will look through
as many files as they can while they are logged onto one account; word
processors will deal with their own files.
Excessive use of the HELP files. The first time a hacker uses a par¬
ticular system, he may resort to the HELP files for advice quite often.
Most hackers do not want to spend thousands of dollars for all the
various mainframe user’s manuals, so they may even print out all of
the HELP files the first time they have access to them.
An operator should be able to tell if the user of a particular ac¬
count has spent three hours in the HELP files. Some system operators
have been known to turn the tables on hackers and put a few tantaliz¬
ing false entries into the HELP files — entries like SECRET or HACK.
When a person asks for help on the topic, the system notifies the
system operator. Because hackers use the HELP files more than users
do, they are much more likely to come across these false entries.
Attempts to hack a password. This is the obvious sign: Note exces¬
sive numbers of unsuccessful log-on attempts. In many cases, an oper¬
ator will ignore these attempts, because he doesn’t quite know what to
do about them. In most cases, this is fine. The system hasn’t been
penetrated, so what can you do but ignore such hacking?
193
OUT OF THE INNER CIRCLE
A system operator should watch these attempts, though, in case
the hacker does get through, He should also pay attention to the ac¬
counts and passwords the hacker is working on, to check for the pos¬
sibility that inside help might have been involved.
THE NEXT Once users and system operators know what to look for and are dili-
STEP gently watching for signs of hacker infiltration, what are they to do
with any information they find? For the user, the answer is usually
simple enough: Back up any data to protect against loss, and tell the
system operator as soon as possible. In most cases, the system oper¬
ator, as the person who set up all the accounts and watches over them,
is fairly well known to the users. If it seems likely - as in a very large
company, for example-that users may not know the name and phone
number of the person to call, make certain that person, and any spe¬
cial procedures for contacting him or her, are readily available.
System operators have a little more trouble and a few more op¬
tions to choose from in handling hackers. They must use all the infor¬
mation they can gather. There is no one l ight way to proceed in all
cases, but the next chapter will offer some advice on what to do with
the hacker you’ve caught. You might say these methods have been
field-tested for effectiveness.
CHAPTER ELEVEN
What to Do with the
Hacker You’ve Caught
F
■A. hiding evidence of hacker penetration is one thing, tike finding
out that your house has been burglarized while you were gone. But
sooner or later you are going to encounter a “hot prowl” — an online,
realtime, live-action intrusion by a hacker. And when you first encoun¬
ter a hacker, it is vital to know how to handle him. A warlike attitude
on your part, plus a misworded warning, plus a hacker who can and
will harm your system could equal disaster. In addition to knowing the
best approach to take with a hacker, you must also know how to iden¬
tify, confront (if necessary), enlist (if possible), neutralize, and safely
remove him.
Once a hacker is on your system, do you know what steps to take to
eliminate him? In most cases I’ve come across, the honest answer is
“No.” Operators usually just kick a hacker off the system by hanging
up the phone line and then killing the account he is using. While this
HANDLING
A HACKER
195
OUT Of THE INNER CIRCLE
simple step sometimes works, and may be the best solution - with a
Novice, for example - very often you will find that the hacker is kicked
off only to come back to life under a different account name. Or you
may afterward find out, to your dismay, that while he was on, your
hacker set up a logic bomb to erase data at a later date or on his order.
Hackers are like electronic ghosts, in a way—they don’t leave just
because you want them to, and they can come back to “haunt” you.
So, it is generally not a good idea to blindly throw a hacker off a system
without asking a few questions first. A direct encounter with a hacker,
if handled properly, can yield invaluable information about the se¬
curity system’s vulnerabilities.
A Case of There was once a system on which I had managed to get one account.
Mishandling One of the system operators discovered me after about two months
and said that hackers were not allowed on “his” system. He suggested
that I hang up and not call back, f said I would try, and added that he
should be sure to kill the account I had been using.
After waiting a few days (a very long time for a hacker to wait), I
called back. When I tried to use the account 1 had been using before,
the computer sent me a message along the lines of, “You were told not
to log onto this system again. Now leave and don’t ever come back.”
Well, I took it rather personally and decided to get back onto the
system - a job that was almost too easy, because the operator had in¬
sisted on keeping the account active, so that he could leave me this
clever message. It was no problem to bypass the program left behind
to give me this message. Rather than hunt for another route, 1 got onto
the system through the operator’s own loophole.
After I did this, the operator wanted very much to talk to me,
and even tried a female user to get me to call in. But I decided that I
didn’t want to talk to him. He did not take my advice to kill the ac¬
count in the first place, he did a poor job by leaving me that message,
and on top of that, he had been insulting. Many hackers cause trouble
for less reason.
If he does decide to come back for a second try, a mishandled
hacker may be interested in making his mark (read “cause trouble”) on
your system before you catch him a second time. But even if he is not
196
CHAPTER ELEVEN What to Do with the Hacker You're Caught
interested in revenge, he will be a little more careful about wasting a
valuable account, so he will try a little harder to avoid detection the
second time around.
As the preceding story shows, attitude has a great deal to do with
whether you handle a hacker poorly or well. It will be easy for me to
tell you how not to foul things up. It will take more effort on your part
to understand your opponent well enough to defeat him.
In Chapter Five, I mentioned a hacking strategy that I called
“thinking like a user.” The same strategy, in reverse, can help any
system operator. Before you make any attempt to communicate with a
suspected hacker, put yourself in his place and think like a hacker.
Like anyone else, hackers do not take kindly to people who take
them for fools. Conversely, they won’t hesitate to take you for a fool if
everything you do or say convinces them that this is true. Regardless
of what you think of hackers, remember that they are probably self-
taught, definitely addicted to computers, and, at least sometimes, jus¬
tifiably proud of what they know.
If you treat a high-level hacker contemptuously, your under¬
estimation of his ability could cost you dearly. At the same time, if you
overestimate a Novice, you don’t stand to lose much and will certainly
make him feel good. Never underestimate the consequences of under¬
estimation: It is far safer to assume intelligence in your counterpart
and to heave a sigh of relief when you discover a beginner than it is to
treat as a Novice a hacker who actually has your system mined.
A hacker, especially a Student, has little reason to “play fair,”
much less reason to offer you his assistance, if he doesn’t respect you.
And the only way you can win his respect is by demonstrating your
own intelligence. All but the wildest rogue Crashers respect intel¬
ligence, and a little thought will spare you vengeful and mischievous
damage to your system. If you play your role effectively, you could
lead the hacker to suspect that you are willing to play a game — which
brings us to a second rule for thinking like a hacker: Treat your hacker
as if he were your opponent in a devious game.
If you think “play it like a game” isn’t a “mature” approach to a
serious problem, I would suggest, from four years of experience, that
Thinking Like
A Hacker
19 7
OUT OF IH( INNER CIRCLE
LINES OF COM¬
MUNICATION
you are already playing a game the moment you make contact with a
hacker. Recognizing that the hacker treats hacking-and his contacts
with you - as a game is the only way you can win. If exploration is the
activity that proves curiosity is a major part of a hacker’s personality,
then game playing is the activity that gives you important information
about the way a hacker views the world.
Many hackers, including me, are dedicated game players: chess,
adventure games like Dungeons and Dragons, video games, hacking
games-in varying degrees, they are all examples of attractive and in¬
tense pastimes that keep high-school hackers up all night.
Remember, chess is a game, but it can be a very serious one. So is
hacking-to a hacker. To borrow a chess term to underscore my point,
let’s say: Choose your gambit thoughtfully, and make sure it’s a good
one, suited to you, your situation, and your opponent. Your immediate
objective is to keep your system’s data and its security intact. Your ulti¬
mate goal is to make your system security stronger. You want to win.
With hacking, that means you need to talk to a hacker in such a way
that you will gain his respect. You have to find a way to turn your
opponent into a colleague.
Operators who want to talk to a hacker will usually try to get his
phone number, thinking either that it would be nice to be able to call
him anytime for security help, or that it would be nice to “have some¬
thing” on him. If the hacker knows what he’s doing, he won’t give you
his name or phone number, and any attempt to trace his call will fail. If
you are dealing with a bright ten-year-old, which is a distinct pos¬
sibility, crude threats might work, and silly ploys might yield a legiti¬
mate telephone number. But if your hacker is seventeen and thinks,
rightly or not, that he’s smarter than you are, a crude approach will net
you nothing and may cause you grief sooner or later.
The solution is to chat with the hacker through the computer,
allow the hacker to call you, or let the hacker give you a “test loop” to
call. (A test loop is a set of two numbers the phone company uses. If
each of you calls one of the numbers in the set, you will be able to
speak to one another, without having to give out your real numbers).
198
CHAPTER ElEVEN What to Do with the Hacker You'w (aught
He may even decide to give you a test loop as his phone number with
out telling you what it is.
In order to preserve data and maintain or enhance system security,
you must first be aware of the danger posed by the hacker. Is sensitive
information or a large amount of money at stake? How much is time on
your computer worth to you and others? How “public” is your sys¬
tem? This is the background that the questions in Chapter Six were
designed to provide. Without a knowledge of what you have to lose,
you’ll be handicapped from the start.
If you intend to use this encounter to strengthen your system,
you have to follow a five-phase plan. Contacting a hacker, and thus
tipping him off that you’re “onto him” before you have a plan and a
few alternate strategies in mind strongly diminishes your chances of
success. I already mentioned the steps you need to take, in the order
they should be taken: Identify, confront, enlist, neutralize, and remove
the hacker from your system.
= You need to identify a hacker if you hope to avoid the lengthy
and laborious process of sift ing through all of your user accounts
to learn which ones are phony.
= In order to find out what you need to know, you usually have to
confront the hacker. This is where the delicate and potentially
rewarding game begins. Now, it’s your ability as a game player,
your ability to put yourself in the hacker’s shoes, that's needed.
— [f you confront the hacker correctly, you can then attempt to
enlist his efforts in bolstering your defenses.
= When you know enough, you can neutralize the hacker and his
works. This means more than locking him out; it also requires a
determination of what other damage might have been done, or
might be planned for the future.
= Then, you can remove liim when you‘ve found out what you need
to know and your dialogue is over.
A FIVE-PHASE
PLAN
(99
OUT OF IHE INNER CIRCLE
TALKING TO A good example of how not to open a conversation with a hacker was
YOUR HACKER shown in the story of Al, the MegaCar system operator at the begin¬
ning of this book. Al started his dialogue with an aggressive state¬
ment: “We know who you are and what you did. Either cooperate or
we will press full charges.” With a different attitude and just a simple
alteration of wording, Al might have steered the conversation down a
much more rewarding path. He might have profited more by saying,
“OK, you’ve told us you are in here. Now we sure would like to know
how you managed to do it.”
If it is convenient, you should try to talk to a hacker before you
throw him off your system. If he is at all reasonable, you stand to gain
quite a bit. But once you’ve decided to try to talk to him, how do you
go about striking up a conversation? What do you say? How do you get
him on your side?
It turns out that most system operators who decide to try to
negotiate with a hacker do a good job of getting information out of
him. You shouldn’t shy away from learning what you need to learn.
Hackers are out to learn, too. They like to exchange information-but
not with anyone who is belligerent. Your approach will depend on
your hacker and how well (or badly) you manage to communicate with
one another, but here is a list of your objectives, along with possible
techniques and possible responses from your “quarry.”
Identify Find out if this is a hacker or the actual account holder. Assume that the
account holder’s name is John; a simple question, like “Eric, is that
you?” or “Do you have those reports done yet, Eric?” may do the
trick. If it does, it will probably work out better than any tiling else,
because the hacker will answer, and you will know he is a hacker, but
he will not know that you are aware of who he is.
On the other hand, John may well have some files — letters, for
example—in his account that gave his name away to the hacker. If you
suspect this is true, a very good alternative is “What is your phone
number?” or “What is your address?” These questions will alert a
hacker right away, but any information known to both the user and
operator, but not to a hacker, will help you confirm the identity of the
person on the account. The hacker may, however, if he’s really serious
200
CHAPTER ELEVEN What to Do with the Hacker You've (aught
about your computer, find out in advance such things as the account
holder’s name, phone number, wife’s name, and so on.
When you try to identify a hacker, one possible answer you may
receive might be something along the lines of “I am not John. I’m a
hacker.” If this happens, there is a good chance, as you’ve seen else¬
where in this book, that the hacker is a Novice. Just as you should
never discount the possibility of security penetration by a high-level
hacker like one of the Inner Circle, you should never dismiss the (per¬
haps humiliating) possibility that a Novice could have cracked your
security. It might help to keep in mind that the June 1983 report of
the Canadian House of Commons’ subcommittee on computer crime
mentioned successful penetrations of the data banks of Canadian com¬
panies and the government by a group of eight-year-old hackers.
Determine the hacker’s motives. In this area, a system operator shifts
the questions toward the hacker himself, for the first time actually
letting the hacker know that he has been discovered. Questions like
“Why do you like our system?” or “What interests you most about our
system?” are likely to get good results here. These are seductive ques¬
tions to any self-respecting hacker, and he will usually be strongly
tempted to “chat” about his personal hacking philosophy with the op¬
erator of a system he has cracked. After all, security is the bond be¬
tween you and the hacker. No matter what his motives, you and he are
both interested in the characteristics of your computer system that al¬
lowed him to break in.
Discover how the hacker got in. It would be nothing less than fool¬
hardy to throw a hacker off without finding out how he got in. If you
don’t know how the hacker got into your system, ask. In fact, this is
one of the few questions that almost any hacker will answer if you ask,
although his response, unless he respects you, is likely to be a very
general statement, such as, “You assign your passwords all wrong.”
Your opponent has no reason to tell you anything truly helpful
until you convince him that you are worthy of his information. To help
in this regard, ask your question along the lines of, “Can you let me
know what you did to get in?” If you ask in another way, you may give
him the impression that you think he has no choice but to answer. In
Confront
Z01
OUT OF IHE INNER CIRCLE
fact, he does have a choice-he has many: He can disappear and leave
you scratching your head, he can refuse to talk to you, he can tell other
hackers, he can damage data... you don’t want to push him into any of
them. Whether you like it or not, at this point, you are still playing a
defensive game. You have to deal with your hacker as a respected
opponent, not a hated enemy, if you hope to gain his cooperation. And
his cooperation, by the way, can be valuable. I know one system oper¬
ator who uncovered a major bug in a major operating system by asking
a hacker how he got in, and because of this, the operator ended up
with a much better job with the company that wrote the operating
system. Bear this in mind: The hacker sees and exploits the “under¬
side” of your system - the normal routes of access are closed to him.
A final note on this subject: At the other end of the capability
spectrum, you may encounter a hacker who doesn’t seem to know
how he got in. If this true, there is a chance someone else did the work.
Careful questioning may lead you to a much higher-level hacker.
Assess his attitude toward your system. It is nice to know whether
the hacker respects your system or thinks it’s “a piece of cake.” Many
system operators will already know the answer to this question be¬
cause of the previous conversation or from clues left by the hacker’s
account activity. If his attitude is unknown, however, it is worth asking
a question like, “So how does our system compare to the other sys¬
tems you have used?” Be prepared for an honest answer.
Along the same lines, it is also definitely worth trying to find out
if your hacker is just waiting for a chance to get back on your system
and kill, kill, kill, or if he is just as happy to move on. You will find that
most hackers are willing to move on down the road, but a few in every
crowd will want to keep using your system. Fewer still will want to
damage your system, but at least forewarned is forearmed.
Did he leave another way to get in? If you can, try to find out about
any trapdoors or spare accounts the hacker may have left for himself.
A hacker wouldn’t be a hacker if he didn’t try to create some alternate
point of entry while he was on a system. A hacker can’t help trying to
log on again, even if he promises not to try. A good system operator
may, if he asks right, even be able to talk a hacker into disclosing any
alternate points of entry.
202
CHAPTER ELEVEN What to Do with the Hacker Y&u f ve Caught
Invite the hacker to become a temporary consultant , If you are consider-
ing this as a possibility, the hacker has already been a consultant to
some degree. If he has impressed you with his knowledge at this point,
you will probably want to talk to him in greater depth. A question
phrased something like, “You seem to know what you’re talking about,
would you like to help us out a bit more?” should break the ice.
If you haven’t considered enlisting your hacker, consider this: As
far as access to your system is concerned, there is little room for de¬
bate. If the hacker got in, there is a security problem. Very likely, he
could help you see just where your security system needs work. Many
companies find consulting a hacker in this way very valuable. Some
have hired hackers for pay, but most find that a hacker who is willing to
help is generally willing to help for free. Hackers like talking to system
operators, and system operators often find the exchange worthwhile.
I (and many of my friends) have talked to rooms full of programmers
by speakerphone - a service for which a consultant might charge hun¬
dreds or even thousands of dollars.
Would he be willing to help you keep the number of hackers down ?
Some companies find it worthwhile to provide accounts on their sys¬
tem to one or more “trusted” hackers. These accounts are watched
carefully, and in exchange the hacker agrees to keep his friends away
from that particular computer. Even if you don’t want to provide the
hacker with an account, you should still ask the hacker if he would be
willing to keep others off for free. Your chances are slim if you don’t
otter anything in return, but the service can be valuable and is well
worth asking for, anyway.
Up to now I have touched on quite a few things I suggest you do. In
many places I have implied or even said that you shouldn’t do certain
things. Here is a list of things you don’t want to do.
Don’t tell him he has no choice. As I said earlier, in most cases by
far the hacker does have a choice. If he never intended to help you
anyway, even if you asked in a nonaggressive manner, then saying this
won’t help. If, as is usually the case, he did intend to talk to you, then
implying that the hacker’s choices are very limited will do nothing but
hurt your cause. Many, many system operators have told hackers that
Enlist
A Few Don’ts
203
OUI 0 f 1 H [ INNER CIRCLE
there was no way out. But hackers usually know when they should be
worried and when they should not. They also know that system opera¬
tors who are planning to press charges aren’t going to talk about it.
Don’t try to use a woman’s name to get the hacker to call in. For
starters, I’m sure it won’t be long before more girls take up hacking,
and then how are you to know who’s at the other end of the line? Sec¬
ond, this is a very old trick and most hackers are only insulted by it.
Some system operators even get a woman to talk to a hacker
while the operator is on another phone listening in. This is really silly,
because the speaker is kept busy trying to figure out what to ask the
hacker from the operator’s hand signals. It doesn’t sound very good.
Don’t demand the hacker’s phone number or address. This is an¬
other area in which the hacker has the advantage. He can just hang up
at any time, so you shouldn’t expect him to give his number to you.
Some operators have been known to say, “We have you traced” and
then, “Give us your phone number” in the same breath... Bravo.
Don’t bother mentioning the possible legal charges. Unless you plan
on pressing charges (in which case, you’ll want to keep it quiet), don’t
bother telling the hacker. He has heard the same thing many times
before, and he knows that these threats always seem to be followed by
.. but we’d rather take care of our security problems ourselves.”
THE FI NAL Once you have succeeded in identifying, confronting, and possibly en-
STAGES listing your hacker, you now have some very valuable information. But
the value of that same information will be reduced to zero if you don’t
use what you know. Rather than kick your hacker off the minute
you’re satisfied that he’s told you enough, it’s better to let those ac¬
counts you know about exist for a short while longer in order to make
sure that you get them all when you decide to act.
You must determine the extent of damage, if any, pinpoint booby
traps or soft spots your opponent knows about, seal off sensitive areas
of programs or data, and prepare yourself for every conceivable coun¬
terattack before you attempt to remove your hacker from your system.
And when you do decide to cut him off, you must be sure to do it in a
way that gives him the fewest options for effective countermeasures.
204
CHAPTER ELEVEN Wfrsl to Do with the Hacker You've Caught
To this point, let’s say you know there is a hacker on your system.
You also have a good idea about how much trouble he is willing to go to
in order to maintain access to your system. Hopefully, you know how
he feels about your system, so you have either a sense of security or a
sense of fear, depending on his attitude. If your talk was productive,
then you also know the basic weak points that the hacker exploited. If
you had a really good discussion, you may have some pointers from
the hacker regarding the enhancement of your security. Now you can
begin neutralizing him.
Draw up a list of accounts the hacker knows about. Proper use of the sys¬
tem logs can work well in this area. Other ideas that have worked in¬
clude having all of your users log off every other hour so you can see
who is left, killing accounts, one by one, known to be owned by the
hacker (to see where he pops up next), and, of course, asking for them
from the hacker himself.
Go over your list of any and all pieces of advice that the hacker gave
you. If he did give you any advice, follow it. Hackers often tell system
operators all they need to know in order to secure a system well
enough to keep hackers out and away. What you must remember is
this apparent willingness to cut off their own access to your system
stems from hackers’ assurance, often reinforced by experience, that
sysops often either fail to understand what they are being told or, for
one reason or another, fail to take the hackers seriously. The hackers
are pretty certain they can try again, and they usually succeed, be¬
cause the sysops did not do everything the hacker advised them to do
or because they did a poor job.
Check for any possible trapdoors, logic bombs, or Trojan horses. In
many cases, you will be able to tell, from your conversation and what
you know of the hacker’s activity, whether your hacker is good enough
at manipulating your system to know how to do these things. If you
feel that he is good enough, you will want to be very careful about
finding any traps. The best way to find them is to look closely at the
files under the directory or directories that the hacker used, because a
hacker quite often doesn’t get around to erasing the files he used to
create the tools he needed.
Neutralize
205
0 U I OF THE INNER Cl R C l E
Remove When you are reasonably certain you have identified all the illegal ac¬
counts and have searched the system thoroughly for trapdoors and
logic bombs, it is time to actually throw the hacker off the system.
You will now have to decide what type of hacker you have on your
system. If he seems reasonable (a Student, perhaps), you will want to
wait until the hacker returns and is online (connected with the sys¬
tem). Once he is, you should diplomatically let him know that you plan
to throw him off. Most operators handle this quite well by telling the
hacker that the owner of the system, the operator’s boss, is getting
upset at the unauthorized accesses and that they cannot continue. In
this way you are again treating the hacker as an intelligent opponent
and are trying to keep him cooperative, even as you declare that the
game is over.
In other cases, however, when the hacker is more volatile or de¬
structive, it is best not to talk to him, because of the danger of further
motivating him toward a destructive act. With this type of hacker, you
can only hope that the procedures you go through in removing him
and denying him further access are done very well.
Whether or not you talk to the hacker, the process of throwing
him off is usually fairly simple. Almost always it is just a matter of
eliminating the accounts involved or changing their passwords.
Now, it’s time for a quarantine. Watch the system closely for at least
a week afterward, to map any further hacker activity. It would
be a great help during this period if users could be told not to use
the system, but this request is almost always unreasonable. Even if
your system remains in use, however, if you watch it for a week or
more, you are very likely to see the hacker try to get back on. If you
don’t already know, you will get a good idea of how he got onto your
system in the first place, You will also stand a very good chance of
heading him off if he succeeds again. If he doesn’t appear to make an¬
other attempt, you are probably okay...then again, there is some¬
times good reason to be paranoid when a hacker appears to stop ti ying,
If he was very, very good_Ah, well, security is an ongoing concern.
Epilogue
don’t know if “right makes might,’’ but in my case, at least, that’s
very true. On the afternoon of October 13,1983, several gentlemen
representing the Federal Bureau of investigation ended my career as a
hacker and put The Cracker into permanent retirement. For those of
you who may be curious, I’ll outline the details here. But first... just a
little bit of background.
Computer security today is the focus of one rapidly changing
area of the law. To hackers, what is known as “browsing” is a (usually)
harmless, “educational” pursuit. In the past year or so, however, I’ve
come to realize that browsing raises some legal and ethical questions,
such as: What constitutes invasion of privacy? What are the rights and
privileges of the individuals involved? On a more technical level, to
what degree are computer memory and electronically coded data en¬
titled to protection under the law?
Such questions are now being considered at both the state and
federal levels, and laws are changing to meet the challenge posed by
207
OUT OF J H E INNER CIRCLE
HOW I GOT
CAUGHT
Telenet and
Telemail
hackers. New attitudes toward browsing are emerging, and I’m certain
that hacking, as I practiced it, will soon be universally considered a
crime - perhaps not as severely punished as more “traditional” com¬
puter crimes, but just as wrong.
Back in the “old days" of 1983, however, while hacking wasn’t
right, it wasn’t exactly wrong, either. And when l was arrested, it was
on charges of wire fraud, because no other federal law was applicable.
I was living at home, with my parents and family, when the doorbell
rang on that Thursday afternoon. But I wasn’t completely surprised to
see two gentlemen standing in the doorway with their identification
and their warrants. The night before, I had called another member of
the Inner Circle, and he had told me his computer equipment, floppy
disks, and even his telephones had been seized a few hours earlier. Al¬
together, I later found out that Federal agents had visited at least nine
members of the Inner Circle, in eight different states, on the preceding
day, October 12th.
After I looked at their identification and read their warrants, the
two gentlemen on the front porch were joined by several colleagues.
They entered my house and searched the premises, and, in the pro¬
cess, confiscated all computer equipment, any electronic equipment
they did not understand, magnetic disks and tapes, my telephone, and
all my notes and written logs. Two or three took notes and made an in¬
ventory of the computer equipment they were taking.
During this visit, 1 was asked a number of questions —did I ever
transfer funds, who were my friends, did I ever damage anything, did I
have any black friends, had 1 sold any secret information - and I was
told that I was one of several people around the country involved in an
FBI investigation regarding unauthorized use of the computer that was
in charge of a service called Telemail, which is accessible from the GTE
Telenet network service.
Telenet is one of the large public networks. When companies link their
computer systems to Telenet, a user only needs to call the network to
access the computer. The charge is often lower than a long-distance
208
I t I l 0 0 U [
phone call would be, and is normally charged to the computer being
called — not to the caller. Telemail is an electronic-mail system that is
also owned by GTE. Many large corporations use TelemaiPs services
as an electronic-mail system, so that their employees around the coun¬
try can easily communicate with one another.
One day, a GTE customer told a hacker about a default password
for user accounts that, as usual, was not changed very often by the
users. User accounts only send mail back and forth, so this information
was not too useful. Still, I obtained a Telemail account in mid-1982,
and other hackers were also aware of this vulnerability for over a year.
There is (or was) a more interesting aspect to Telemail, however.
When a corporation uses Telemail as its electronic-mail system, it is
given a special account known as an administrative, or “admin” ac¬
count, that gives the user the power to create other accounts. The
person who has the admin account is, in effect, a system operator, and
uses the account to create accounts for all the people who will be using
the mail system. There are hundreds of these admin accounts, each
one controlling as many as several hundred users.
Eventually, some hacker decided that it would be worthwhile to
get an admin account. Using a typical user’s account, he was able to get
a list of all the admin accounts.. .very obligingly furnished by the sys¬
tem at the hacker’s request, complete with first and last names of the
owners. Members of the Inner Circle and other hackers then tried out
hundreds of different admin accounts, using the owner’s first name as
a password. In a few cases, this simple scheme worked.
I became the “owner” of an admin account in November 1982,
and through the end of the year, I kept busy learning how to use it.
During this time, I could have read private bulletins placed by NASA,
Raytheon, Bell Labs, the Jet Propulsion Laboratory, and most of the
other Telemail subscribers. (I didn’t, of course—NASA and the others
are pretty big, and 1 prefer to think I’m not foolish.)
Between about January and June 1983,1 did nothing more with
my admin account. During this time, there were only a few (about ten
to fifteen) hackers using Telemail. Then, in August, other hackers and
I used our admin accounts to create our own bulletin-board system.
Word spread, and eventually more than forty hackers used Telemail
209
OUT OF THE INNER CIRCLE
to communicate with one another. A few, who had admin accounts, set
up accounts for other users.
Then, we began to realize there was something strange about
this system: It was not set up in the way most hackers were accus¬
tomed to. When a hacker went to look for a system operator, he found
that there was no system operator to talk to. No one with more power
than the admins seemed to exist.
It was as if Telemail were a ghost town. There seemed to be no
humans running the place - just the computer system, watching over
the admins who, in turn, watched over the users. Although the users
of admin accounts had more power than anyone else, there had to be a
still more powerful sysop’s account, with control over all the admins.
But no matter how hard we tried, we could find no system operator.
After several months, we began to feel no one cared about us. We
had heard that Telemail served about twenty-five thousand people.
Was it possible that forty hackers were not noticed at all? We were
only 0.16 percent of the total, so it seemed quite possible.
But acceptance of that hypothesis led to our downfall.
Caught If you are not extremely careful and self-observant, very soon you
stop thinking like a hacker. Hackers who were using Telemail started
to get a little careless. At least one left his name or phone number on
the system. Another made the mistake of writing GTE a tettes that
offered to help solve Telemail’s security problem. Three months later,
thanks to word of mouth, there were one- to two-hundred hackers on
the Telemail system.
As a result, the FBI was called in and eventually started raiding
the houses of the people they could track down. I was told some details
of the techniques the FBI used in its investigations, and I think I can
make some fairly good guesses about the rest.
I assume that the responsible people at GTE were alarmed when
they first realized what was happening. Because of their many and
varied clients, and because their problem involved much more than a
single state, Telemail must have called the FBI (whose agents, by the
way, admitted more than once that they hoped to find more trouble
than they did).
210
EPILOGUE
Next, the FBI must have told the customers not to send any im¬
portant information over the mail system - or, perhaps, to move to a
different mail service altogether during the investigation. After that,
the agents started monitoring the mail and bulletins being sent by the
hackers over Telemail. They used these messages as a source of clues
to our real names and addresses, and to try to find out how criminal
our intent was. I was told by two different FBI men that all the mail we
sent was kept.
The FBI must have then taken the clues from our mail and used
that information to locate a few of the people involved. From there, I
would guess they obtained other names through long-distance phone
records of calls placed by the hackers to their friends. After all this, the
FBI had the names and addresses of about twenty people. Of those,
they were most interested in members of the Inner Circle — either
because the Inner Circle was the first to use the mail system or be¬
cause we were the only organized hackers to use the system at all.
Several months after my initial meeting with the FBI agents, I was
quite surprised to see all my confiscated computer equipment re¬
turned, via US, registered mail. Everything had been packed into a
large cardboard box and protected with a little foam. Luckily, the
damages were quite minor - under $200, I had a few friends whose
equipment was completely useless when it was returned, but they
were just happy to see it again at all
Several months later, I was indicted. Once again, it took me by
surprise, A reporter for a local newspaper called me in May 1984, He
told me he had just read a wire story that said that I had been named in
an indictment for three counts of wire fraud. I told him to call my
lawyer, who was also surprised, but called me back with the news that
I was, indeed, indicted on three counts of wire fraud by a federal grand
jury in Alexandria, Virginia. According to the indictment;
ec L It was part of the device , scheme, and artif ice to defraud that
the defendant, William Landreth, wotdd access the GTE Telenet
Communications Corporation Electro me Mail Service through a
telephone number located in San Diego f California ,
How It Ended
211
OUT OF THE INKER CIRCLE
ff 2. It was further part of the device , scheme and artifice to de¬
fraud . p /he defendant, Wiffiarm Landreth , would without
GTE*s authorization or the authorization of Raytheon Com¬
pany or the American Hospital Supply Company (GTE custom¬
ers], acquire user names and passwords or access codes , * * *
The indictment goes on to say that I created accounts so that un¬
authorized people could use the mail system*
After consulting with my attorney, I decided to plead guilty to
the charges. The United States Attorneys agreed to drop two of the
counts if I decided to plead guilty leaving me with one count. Wire
fraud is punishable by a prison term of not more than five years and/or
a fine not exceeding $1000. Luckily, the prosecuting attorney was a
reasonable person and agreed with a suggestion by my probation of¬
ficer that I be fined $100 and be given 100 hours of community work
to perform. Before sentencing me, however, the judge decided he
wanted some psychological testing done on me as he stated in court,
“There’s indication [Bill] has a very high IQ, but there's an indication
he is not motivated to improve on that_He’s having trouble com¬
paring right and wrong/'
I was then sent to the Metropolitan Correctional Center in San
Diego, and was given some IQ-type tests, ink-blot tests, personality
tests, and a test to see how well 1 know my school subjects, I was not
told how I did on the tests, but finished in two days and was out in four.
Finally on November 13,1984, just over a year after I was caught, I
was sentenced to three years 7 probation, during which I must com¬
plete my high-school education, go on to college or perform 200 hours
of community service, and reimburse GTE $87 for unpaid telephone
charges. I think the sentence is very fair, and I already know what my
major will be.. * *
ALL'S WELL The main reason that my case even existed was that the people at Tele¬
mail did not know how to secure their system against unauthorized
users* If they had, they would have kept us out. The fact that Telemail
went directly to the FBI, and did not ask us if we would leave or if we
212
EPILOGUE
could help them, makes me think that Telemail was very serious about
security, but had no control over it.
This type of situation - a computer that needs security but does
not have it - could be a very big problem, considering the fact that
computers are becoming more and more a part of our lives every day.
I wrote this book because I think it is important that system own¬
ers, operators, and users have the knowledge to protect their systems
from intruders. Now, I hope ignorance is no longer an excuse.
APPENDIX
A Hacker’s Evaluation
Of Some Available
Security Equipment
T
■JL he information contained on the following pages is not meant to
be taken as a technical review of computer-system security products,
nor is it meant to suggest or recommend that you consider purchasing
a particular unit.
Yve included this appendix to give you a hacker’s thoughts on
some of the types of security equipment available to you before you
commit yourself to any one. The list is far from complete, but it should
help you decide what, exactly, you want from a security system, as
well as what you should expect to get. Any of these units should help
safeguard your computer system from outside access by a typical
hacker. For pricing and more detailed information, please contact the
companies themselves.
1 also highly recommend that you investigate products you hear
about other than those listed here. Once this appendix has given you
an idea of what should be investigated, you will be better armed for
such a process.
215
OUT Of THE INNER CIRCLE
CALLBACK DEVICES
Sleuth Manufacturer: C.H. Systems, Inc., 8533 West Sunset Boulevard, Suite
106, Los Angeles, CA 90069, (213) 854-3536.
Type of device: Callback unit-designed to interface between a com¬
puter and a Hayes Smartmodem.
How it operates: The user connects with Sleuth after calling the re¬
mote computer, and Sleuth asks the caller for a name and password.
After the name and password have been entered, the unit hangs up
and verifies this information. If the name/password combination is
found to be acceptable, the device calls the phone number correspond¬
ing to that name.
Advantages: The device is reasonably priced, and the name/password
combination means that Sleuth is more of a filter and a callback than
some other callback units are.
Disadvantages: There is a limit (74) of names/phone numbers per
unit. Also, the device is designed for a limited situation, which is dis¬
cussed next.
Best suited for: Sleuth is suited well to a small business with a small
system - perhaps even a microcomputer. The limited number of au¬
thorized locations, and the fact that many larger systems have mo¬
dems other than Hayes, makes Sleuth the type of device that is best for
small businesses.
Comments: The company has just announced support for additional
makes of modem; many other modems are Hayes-compatible, as well.
The device can be used simply as a filter system, if desired, and there
are a few unique features that are worth investigating if you think this
device may help your security efforts.
DrsdmmT Microsoft Press has not undertaken a comprehensive investigation of [he fact and representations
of the author with regard to particular computer systems, operating systems or other products. Consequently,
although it has no knowledge of any inaccuracies in the authortreatment of particular products, Microsoft
Press makes no warrant ies or representations regarding their accuracy and disclaims all liability therefor.
216
APPENDIX
Manufacturer: Digital Pathways, Inc., 1060 East Meadow Circle,
Palo Alto, CA 94303, (415) 493-5034.
Type of device: Callback unit using either your modem or theirs.
How it operates: The user calls the computer and enters his or her
code on a touch-tone phone. The unit verifies the code, and tells the
user, via a recorded voice, to expect callback. If all modems are busy,
the voice tells the user there will be a delay before callback. The user
can then decide not to be called back, or to accept the delay.
Advantages: The unit is flexible in design and has provisions for an
extended log system.
Disadvantages: It is subject to the general problems for callback mo¬
dems listed in Chapter 8, and the design, while flexible, may require
more frequent maintenance than some other units.
Best suited for: Defender II seems well suited for most companies
looking for callback unit security. Its design allows a company to start
out with only a few outgoing lines and, over time, increase this number
to hundreds, if needed.
Comments: This unit is quite user friendly, and should certainly be
considered along with the other units available by anyone looking for a
callback unit.
Manufacturer: Backus Data Systems, 1440 Koll Circle, Suite 110, San
Jose, CA 95112, (408) 279^8711
Type of device: Callback device—via RS-232 standard interface.
How it operates: In the basic system, the callback unit simply calls
users back after asking for, and verifying, a six-character ID and a six-
character password. There are many other options, however.
Advantages: Backus Data Systems is currently adding features and
updating the system. The unit provides a versatile callback network.
Disadvantages: Because it is a system of several different devices,
now being updated, possible weaknesses are impossible to pinpoint.
Defender II
DialSafe
217
our OF 1 H f INNER CIRCLE
OZ/Guardian
Data Sentry
Best suited for: It is difficult to say who would gain the most benefit at
this point. It does seem, however, that this system will not be targeted
toward either the smallest or the largest of computer systems. I esti¬
mate that a system with from three to nine modem lines would find
DialSafe most helpful.
Comments: Anyone who feels the need for callback security should
certainly look into the DialSafe system, along with all the others men¬
tioned here. By the time this is published, the DialSafe system should
be well established and may very well be one of the better callback
units available.
Manufacturer: Tri-Data, 505 East Middlefield Road, Mountain View,
CA 94039-7505, (415) 969-3700.
Type of device: Callback modem - RS-232 Bell 103/212a compatible.
How it operates: The user calls the modem and enters a password of
1 to 250 characters. The modem then hangs up, verifies the code, and
calls the user back, if the password is valid.
Advantages: This system provides typical callback security, with up
to 250 passwords/numbers for each unit. It also has provisions for
limited audit trails.
Disadvantages: The unit is subject to the problems of mos\ tailback
modems, as discussed in Chapter 8.
Best suited for: This is one of the callback modems that should be
investigated by people who feel they require such a device. Com¬
panies that feel a callback modem would solve their security prob¬
lems, will find the OZ/Guardian a very likely candidate.
Comments: The OZ/Guardian is a good callback unit. The support
provided by Tri-Data makes the overall product better than some, but
it is otherwise a typical representative of this group of devices.
Manufacturer: Lockheed GETEX, 1100 Circle 75 Parkway N.W.,
Atlanta, GA 30339, (404) 951-0878.
218
APPENDIX
Type of device: Callback modem. A Bell 212a- or 103-compatible
modem that uses standard RS-232 ports.
How it operates: The user calls and leaves a phone number with the
modem, which can be instructed either to call the given number or to
check the number against a list of authorized phone numbers. After
the modem calls the number, the user must provide a correct pass¬
word or the modem will no longer call anyone at that number.
Advantages: The device can be programmed to call back any number
given to it, without regard to lists of authorized numbers, and it main¬
tains a list of unauthorized, as well as authorized, numbers.
Disadvantages: There is a limited number of both authorized and
unauthorized numbers, and the device itself is subject to most of the
problems discussed under callback modems in Chapter 8.
Best suited for: This device is best for a high-security computer sys¬
tem, because it may cut off authorized users who type their passwords
incorrectly. It also has a somewhat limited authorized-number list, so
it is a bit restricted, unless the number of users who may access the
computer via modem is small — as in high-security situations.
Comments: As with most external security devices, the Data Sentry
System is not likely to be cracked by a typical hacker. This system,
however, like many others available, does not provide security against
a hacker who has access to any directly connected terminal or to the
computer itself.
Manufacturer: LeeM AH Datacom Security Systems, 3948 Trust Way,
Hayward, CA 94545, (415) 786-0790.
Type of device: Callback unit — SAM is placed between your modems
and the phone lines.
How it operates: The user calls in and enters a one- to fifteen-digit
Location Identification Number (LIN). If the LIN is valid, an acknowl¬
edgment tone is emitted so the user will know to expect callback
within five to ten seconds.
Secure Access
Multiport (SAM)
2W
our OF I H £ INNER CIRCLE
ComputerSentry
Advantages: The SAM can handle more callback locations - over
2300 - than any other I have seen. It also has quite a bit of support in
the way of an extended log system, as well as such features as “Time
Portals,” which restrict certain LI Ns from operating during certain
time periods.
Disadvantages: The general problems discussed under callback mo¬
dems in Chapter 8.
Best suited for: Anyone who needs a callback unit should consider the
SAM. Its large size makes it best suited for larger systems, but its price
is very reasonable, and LeeM AH will customize a unit to certain spec¬
ifications to minimize cost.
Comments: The Secure Access Multiport is a typical callback unit,
with above-average support from the parent company and a reason¬
able price. It is also quite versatile in terms of potential expansion.
FILTER DEVICES
Manufacturer: TACT Technology, 100 North 20th Street, Phila¬
delphia, PA 19103, (800) 523-0103.
Type of device: A filter unit which is placed between a modem and a
phone line.
How it operates: The user calls and a synthesized voice asks for an ID
code, which can be entered either by touch tone or by voice. As soon
as the user enters a correct code, the modem-to-modem connection
is allowed.
Advantages: The unit allows a selectable number of false attempts,
after which an alarm can be set to go off. The device is very friendly to
authorized users.
Disadvantages: Some users may have difficulty in using auto-dial
modems with this particular device. Unauthorized users who gain ac¬
cess also find the unit user friendly.
220
APPENDIX
Best suited for: This filter system could probably be used by a com¬
pany that is not quite certain whether to invest in a callback unit or to
stay with basic password security. The device offers a good compro¬
mise level of security for many people.
Comments: A typical filter system, with better-than-average provi¬
sions for handling unauthorized code entries. The synthesized voice
and a provision for allowing the user to enter the code verbally are
also unique features.
Manufacturer: Sutton Designs, Inc., Ill South Cayuga, Suite 200,
Ithaca, NY 14850, (607) 277-4301.
Type of device: Filter system - one per RS-232 modem.
How it operates: The user calls the system and enters a six-character
password. Each character can be any of the 128 ASCII characters. If
the correct password is given, the user is then allowed to communicate
with the host computer, which will probably also have its own pass¬
word procedure.
Advantages: This product provides a multi-level password system and
is an inexpensive guard against casual hackers.
Disadvantages: It is subject to the same weaknesses of all password
systems, and is generally not useful for local terminals or for comput¬
ers on public networks.
Best suited for: This system is best for a typical non-classified com¬
puter installment that has had trouble in keeping hackers off its sys¬
tem. In addition, the owner of a system with too many users who are
too lax about security should, in general, find this type of device the
next logical step in enhancing security.
Comments: This device is not intended to be a security cure-all, but
what it does - cut the number of hackers on a typical system to zero-it
does very well. In most cases, this type of device is actually more
effective against hackers than a callback unit. Hackers have other
procedures they can use against callback units; against this type of
EnterCept
221
OUT OF THE I H N E B CIRCLE
unit, they must crack the password or forget about getting into the
system altogether.
ENCRYPTION DEVICES
Sherlock
Information
Security System
Manufacturer: Analytics Communications Systems, 1820 Michael
Faraday Drive, Reston, VA 22090, (703) 471-0892.
Type of device: DES (Data Encryption Standard) Encryption. Each
terminal is supplied with an Information Security Module (ISM) which
is responsible for encrypting and decrypting data.
Hoiv it operates; The central unit generates DES encryption keys,
which are then used to encrypt and decrypt data. In the case of remote
terminals, DES keys are transported by way of the “Authenti-Key”
device, which is a solid-state “key” containing the encryption code.
Advantages: Data encrypted with this method will NOT be decrypted
without the correct key or the effort and resources of a full-scale
corporate or governmental effort - and even then, the probability of
success is not that great. In addition, keys are generated by the ma¬
chine, which is programmed to choose complex keys; the result is not
known to any human being.
Disadvantages: In many cases, the DES key will need to be trans¬
ported. Since it is an actual, solid device, the key can be stolen like
anything else. Some people also attack the Data Encryption Standard
itself, saying it can already be decoded by government agencies. But
this opinion has never been confirmed, and many people say that it is
100 percent untrue.
Best suited for: This is a device that is best suited for a very high-
security situation. It is a very comprehensive, well-implemented sys¬
tem, but the cost per user, in addition to a little bit of inconvenience,
makes it most useful for a very high-level security installation.
Comments: The company that produces the Information Security
System has fifteen years of experience in communications security,
222
APPENDIX
working with such institutions as the U.S. Department of Defense. The
company maintains that all possible encryption techniques were scru¬
tinized before this particular procedure was chosen.
Manufacturer: Obsidian Computer Systems, 236 North Santa Cruz
Avenue, Suite 243, Los Gatos, CA 95030, (408) 395-7900.
Type of device: Software encryption - a program for MS-DOS or
CP/M microcomputers.
How it operates: After the user calls up the encryption program, he or
she enters the key or keys. The file is encrypted, and the old file is
overwritten on the disk by the new file. If the file has already been
encrypted with the same key, the encryption process will actually
decrypt the file.
Advantages: It is probably impossible for a hacker to decrypt a file
encrypted with the Super Encryptor II. The encryption technique is
fairly quick, although larger files may still take time to encrypt.
Disadvantages: The user must choose long and complex keys... and
remember them. The product is also subject to the general problems
of software encryption discussed in Chapter 8.
Best suited for: People who use a microcomputer to obtain security-
sensitive data from larger systems may have a need to encrypt this
data. Also, some people may have a need to encrypt data from a mi¬
crocomputer so that it can be safely transported from one location to
another, with the key being transported by another method.
Comments: Encryption of this type is unlikely to be used on an every¬
day basis, unless the effort involved is really necessary.
UNIQUE IDs
Manufacturer: Avant-Garde Computing, Inc., 8000 Commerce Park¬
way, Mt. Laurel, NJ 08054, (609) 778-7000.
Type of device: Multi-purpose network security.
Super Encryptor II
Net/Guard System
223
OUT OF r H F INNER CIRCLE
Data Lock & Key
How it operates: The Net/Guard system should be transparent to
users. In those cases in which the owner of the system chooses to have
Net/Guard perform callback or filter functions, however, the system
will act as a typical callback or filter device.
Advantages: This device provides an operator with instant, up-to-date
information on network usage. It also allows the operator to restrict
the use of specific accounts to certain days of the week, certain hours
of the day, or certain parts of the network or computer.
Disadvantages: This is a major device, best integrated into a new sys¬
tem. It is also designed for larger systems, so it is too expensive and
comprehensive for many systems.
Best suited for: It is best suited for large systems with large security
concerns... a system that is best used with an operator always on duty.
Comments: The Net/Guard system, when used where it is needed, as
it is designed to be used, can be one of the most comprehensive and
effective security systems available. Security, however, is only one of
the functions that Net/Guard performs, so a buyer interested in se¬
curity alone may pay for other, non-required, advantages. It should be
looked into, however, if your system warrants such protection.
Manufacturer: MicroFrame, Inc., 205 University Avenue, New
Brunswick, NJ 08901, (201) 828-4499.
Type of device: Unique ID-One unit with every user, main unit at the
main computer.
How it operates: The user calls in with his or her data key, which is a
box about the size of a small modem, and connects with the computer.
The computer may or may not have further password security, but no
one without a valid data key will be connected at all.
Advantages: The physical lock and key on the Data Lock & Key pre¬
vents misuse, and the system offers provisions for extended logs.
Disadvantages: There is the possibility of a stolen unit gaining entry,
and this device may possibly lead to laziness in terms of local security.
m
APPENDIX
Best suited for: The Data Lock & Key seems best suited for a smaller*
than-average computer installation, with above-average security re¬
quirements. It will certainly keep out the hackers, though I don't know
if it was designed with thieves in mind.
Comments: While the Data Lock & Key does a good job of making the
user do as little as possible, the user is an active part of the process.
This may be good or bad, depending on your viewpoint, but this fact
suggests to me that the unit is designed with a high-security situation
in mind* I should also mention that the Data Lock & Key has excellent
procedures for handling lost or stolen keys that are reported.
Index
A
Account, 13
test, 14
Advanced Research Projects Agency of the
Defense Department (ARPA), 26
Alpha Hacker, 17
American Standard Code for Information
interchange (ASCII), 43-45,145-46
control characters, 43
American Telephone and
Telegraph (AT&T), 30
B
BASIC, 53-54, 88-89
Baud, 45
Bell Telephone System, 30, 31
Bits, 44, 45
Blue boxes, 32
Bulletin boards, 12,163, 168-84
hacker, 174-80
public, 169-74
security of, 180-83
Byte, 44, 45
c
Callback units, 149-53
Data Sentry, 218-19
Defender II, 217
DialSafe, 217-18
OZ/Guardian, 218
problems with, 150-51
Secure Access Multiport (SAM), 219-20
Sleuth, 216
techniques used by hackers, 151-53
call forwarding, 152-53
holding the line, 151-52
Cap'n Crunch, 31-32
Central processing unit (CPU), 39
Cheshire Catalyst, 33-34
CompuServe, 38, 80, 87
The Cracker, 9-10, 15-16, 196, 207-13
D
DECnet, 121
Decoy programs, 74, 86-87
Dow Jones, 38, 87
Draper, John. See Cap’n Crunch
227
OUT OF THE INNER CIRCLE
E
Electronic mail, 189-90
Encryption, 144-48
problems with, 147-48
Sherlock Information Security System, 222-23
Super Encryptor II, 223
Engressia, Joe, 29-31
External security devices, 143-60
nonstandard, 157-58
F
Files
added, 188
altered, 187
directories, 188
in electronic mail, 189
prior versions, 189
Filter systems, 153-54
ComputerSentry, 220-21
EnterCept, 221-22
Fingerprint verification, 159
Floppy disks
and security, 165-67
414s, 35-36
G
General Telephone (GTE), 10
H
Hackers, 25-26
confronting, 201-2
discouraging, 114-16
of the eighties, 34-36
enlisting, 203
handling, 195-96
hierarchy of, 51
identifying, 200-201
goals, 75
levels of hacking, 69-72
methods used by, 76
database hack, 83
Hackers, methods used by (continued)
decoy, 83-87
hack-hack, 81-82
logic bombs, 97-100
remote sysop, 90-92
reverse hack, 82-83
short hack, 82
trapdoor, 92-94
Trojan horse, 94-97
worm programs, 100-102
motivation of, 58-59
neutralizing, 205
profiles of, 59-69
the Crasher, 66-68
the Novice, 61-62
the Student, 62-64, 197
the Thief, 68-69
the Tourist, 64-66
removing, 206
“rights’’ of, 51
rules of, 60
of the seventies, 28-34
of the sixties, 26-28
telltale signs, 185-94
thinking like, 197-98
Help, 52-56
inside a company, 125
i
IBM-370, 78
Information networks, 34-35, 104-5
Information trading, 14-15
Inner Circle, 16-23
capers, 19-23
“code of ethics,” 18-19
formation of, 16-19
Inner Circle Seven, 18
L
LISP, 27
Log systems, 154-56
improved, 154-56
logging on, 133-37, 186-87
logic bombs, 97-100
problems with, 155-56
228
INDEX
M
MAC project, 26-28
Mainframe computers, 27, 41
Massachusetts Institute of Technology (MIT), 26
McCarthy, John, 27
Memory, 87-89
manipulation of, 133-34
Microcomputers, 39-40
employee risks, 167
and hackers, 164
and passwords, 164
and security, 161-84
in small business, 163-64
Modems, 38-39, 45
Multifrequency system, 30
N
Networks, 46-48
ARPANET, 47,110
Autonet, 104
DIALOG, 113
public, 47-48
Telenet, 104
Tymnet, 104
UN I NET, 104
o
Operating systems, 41-43
defaults, 79-80
log-on sequence, 43
logging on, 42
Primes, 42, 80, 120
prompt, 42-43
RSTS, 11849
TOPS-20, 42, 118-19
trapdoor, 92
UNIX, 92, 11748
use of, 42
VMS, 42, 119
p
Passphrases, 158
Passwords, 76, 137-40
best, 140
changing, 139
common, 83
default, 137
Personal computers. See Microcomputers
Phone lines, 128-30
Phone phreaks, 29-32
Primos, 42, 80, 120
default accounts, 80
Public-access computers, 38
CompuServe, 38, 80, 87
Dow Jones, 38, 80
THE SOURCE, 38,80,110
R
Remote Sysop, 90-92
RSTS, 118-19
s
Security
and accessibility, 104-7
checklist, 11647
cost of, 103-4
disguising your system, 140-41
evaluating your system, 10742
and networks, 104-5
requirements, 112-14
ways to protect your system, 127-33
Signature verification, 159
THE SOURCE, 38, 80, 110
Supercomputers, 41
Superminicomputers, 40-41
System crash, 28
System operator, 2, 49-50
229
OUT OF THE I H N l R CIRCLE
Technological Assistance Program (TAP), 32-33
Telecommunications, 37-39
software, 162-63
autologon macro, 162-63
Telemail, 10, 208-13
Terminals, 46, 127-28
dumb, 12, 46
port, 46
smart, 46
with unique identification numbers, 156-57
Time-sharing, 27-28, 48-49
logging off, 48
logging on, 48
private passwords, 49
user name, 48
TOPS, 42,118-19
Trapdoor, 92-94
Trojan horse, 94-97
UNIX, 92, 11748
Users
educating, 126-27,139-40,190-91
v
VM-370, 120-21
VMS, 42, 119
Voice verification, 159
w
WarGames, 26, 35
Worm programs, 100402
230
The manuscript for this book was prepared and submitted
to Microsoft Press in electronic form. Text files were
processed and formatted using Microsoft Word 1
Cover design by Ted Mader and Associates.
Cover photo by Raul Vega.
Interior text design by Chris Stern .
Text composition by Microsoft Press in Rotation with
display in Erbar ; using CC1 Book and the Mergenthaler
Linotron 202 digital phototypesetter.
Cover art separated by Color Masters, Phoenix, Arizona *
Printed on 12 pt> Carolina by Strine Printing Company,
York, Pennsylvania, Text stock , 60 lb . Glatfelter Offset,
supplied by Carpenter/Offutt, Book printed and bound by
Fairfield Graphics f Fairfield, Pennsylvania,
OTHER TITLES FROM MICROSOFT PRESS
THE APPLE ENVIRONMENT
The Apple Macintosh Book
Cary Lu
ISBN 0-914845-00-4 $18. 95
Presentation Graphics on the Appie
Macintosh
How to Use Microsoft Chart to Create
Dazzling Graphics for Professional and
Corporate Applications
Steve Lambert
ISBN 0-914845-11-X $18,95
MacWork MacPIay
Creative Ideas for Fun and Profit
On Your Apple Macintosh
Lon Poole
ISBN 0-914845-22-5 $18,95
The Endless Apple
How to Maintain State-of-the-Art
Performance on Your Apple II and He
Charles Rubin
ISBN 0-914845-27-6 $15,95
THE IBM ENVIRONMENT
Running MS-DOS
The Microsoft Guide to Getting the Most
Out of the Standard Operating System for
The IBM PC and 50 Other Personal
Computers
Van Wolverton
ISBN 0-914845-07-1 $19,95
Exploring the IBM PCjr Home Computer
Peter Norton
ISBN 0-914845-02-0 $18,25
Discovering the IBM PCjr Home Computer
Peter Norton
ISBN 0-914845-01-2 $15,95
Managing Your Business with Multiplan
How to Use Microsoft's Award-Winning
Electronic Spreadsheet on Your IBM PC
Ruth K. Witkin
ISBN 0-914845-06-3 $17.95
Getting Started with Microsoft WORD
A Step-by-Step Guide to Word Processing
Janet Rampa
ISBN 0-914845-13-6 $16.95
GENERAL
Silicon Valley Guide
To Financial Success in Software
Daniel Reiner, Paul Remer, and
Robert Dunaway
ISBN 0-914845-09-8 $19.95
Learning Commodore 64 Logo Together
An Activity Book for Creative
Parents, Teachers, and Kids
Kenneth P. Goldberg
ISBN 0-914845-24-1 $14.95
Online
Executive’s Guide to America’s
Leading Information Services
Steve Lambert
ISBN 0-914845-35-7 $19.95
Available wherever fine books are soid.
\ \/j ir'1 I 1 I ! I; : ! i A< I !
Computer systems wizard ... 19-year-old hacking maverick capable of “cracking” the most
secure computers ... member of the “Inner Circle” nationwide clique of top-notch hackers ...
apprehended by the FBI... indicted by a Federal Grand Jury... now ... author of the
eye-opening inside story of America’s secretive hacking culture.
AN INSIDER GOES PUBLIC
ON THE HACKER UNDERGROUND
OUT OF THE INNER CIRCLE—by the reformed “Cracker” —is the story of adolescent
innocence and ingenuity mixed with high-stakes corporate and government intrigue. Included are the
details of the more illustrious capers of the “Inner Circle” along with the story of “The Cracker’s”
ultimate capture.
Estimates of losses from computer crime range from $100 million to more than $45 billion. No
one knows the true extent of this epidemic—and we are all potential victims. How can you protect
yourself and your company’s data?
OUT OF THE INNER CIRCLE is also a valuable computer security handbook. “The Cracker”
provides a security checklist identifying the security loopholes exploited by hackers in today’s popular
mini- and mainframe computers and their operating systems. Is your system vulnerable? How can
you inexpensively discourage unwanted incursions? What are the favored methods of hacking?
How does a hacker think? What rules does he live by? And how can you catch him?
—an engrossing and enlightening look at one of today’s major issues.
In USA and Canada
MICROSOFT,
PRESS
$9.95
ISBN □- c Uj4A45-3L,-5
S&S No. D-L71-3DT4B-
□
Outside USA
and Canada
U.K. £8.95
PENGUIN
ISBN □-14-Dfl7-131-X